Proceedings of the 52nd Annual Design Automation Conference 2015
DOI: 10.1145/2744769.2744847
|View full text |Cite
|
Sign up to set email alerts
|

Hafix

Abstract: Code-reuse attacks like return-oriented programming (ROP) pose a severe threat to modern software on diverse processor architectures. Designing practical and secure defenses against code-reuse attacks is highly challenging and currently subject to intense research. However, no secure and practical system-level solutions exist so far, since a large number of proposed defenses have been successfully bypassed. To tackle this attack, we present HAFIX (Hardware-Assisted Flow Integrity eXtension), a defense against … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 128 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…We implemented a proof-of-concept prototype of CaRE on the ARM Versatile Express Cortex-M Prototyping System MPS2+ configured as a Cortex-M23 CPU. 15 .…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…We implemented a proof-of-concept prototype of CaRE on the ARM Versatile Express Cortex-M Prototyping System MPS2+ configured as a Cortex-M23 CPU. 15 .…”
Section: Methodsmentioning
confidence: 99%
“…An important feature of M-class cores is their deterministic interrupt latency in part attributable to the fact that the context-switch, while entering the exception handler, is performed entirely in hardware. An instruction that triggers an exception, such as the svc used for supervisor calls, causes 1) the hardware to save the current execution context state onto a stack 15 We also tested our prototype on the CMSDK_ARMv8MBL FastModel emulator pointed to by one of the sp registers, 2) the ipsr to be updated with the number of the taken exception, and 3) the processor to switch into Handler mode in which exceptions are taken. Table 4 shows the layout of a typical stack frame created during exception entry 17 .…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition to the instructions, the processor needs the metadata defining a complete CFG. Some solutions such as HAFIX [5] or CHERI [18] propose to enrich the instruction set architecture (ISA) semantic with new instructions, embedding the metadata in the instructions themselves.…”
Section: Introductionmentioning
confidence: 99%