RetTag: Hardware-Assisted Return Address Integrity on RISC-V

8Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Memory-corruption-based return address hijacking, such as Return-oriented Programming (ROP), is a prevalent attack technique that compromises the program's control flow integrity. So far, software-based defenses against these attacks either introduce heavy performance overhead or trade-off security for performance. Meanwhile, some hardware-Assisted defense mechanisms are not practical for large-scale deployment due to additional requirements of hardware features and flaws caused by complicated design. In this paper, we present RetTag, a hardware-Assisted and crypto-based defense scheme on RISC-V architecture that leverages Pointer Authentication Code (PAC) embedded into the unused bits of function return address to ensure return address integrity. We extend RISC-V ISA with Return Address Authentication (RAA) instructions to generate the PAC efficiently. We integrate RetTag into the mainstream compilers GCC and LLVM to help developers transparently employ the defense and implement a prototype of RetTag on the Rocket emulator and FPGA development board to demonstrate its effectiveness by detecting various ROP attacks. Moreover, the performance evaluation shows that RetTag only introduces 0.11% performance overhead on NBench and 7.69% on Coremark.

Cite

CITATION STYLE

APA

Wang, Y., Wu, J., Yue, T., Ning, Z., & Zhang, F. (2022). RetTag: Hardware-Assisted Return Address Integrity on RISC-V. In EuroSec 2022 - Proceedings of the 15th European Workshop on Systems Security (pp. 50–56). Association for Computing Machinery, Inc. https://doi.org/10.1145/3517208.3523758

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free