Hardware assisted randomization of data

16Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques for memory corruption vulnerabilities. Previous work on mitigating data-oriented attacks includes Data Space Randomization (DSR). DSR classifies program variables into a set of equivalence classes, and encrypts variables with a key randomly chosen for each equivalence class. This thwarts memory corruption attacks that introduce illegitimate data flows. However, existing implementations of DSR trade precision for better run-time performance, which leaves attackers sufficient leeway to mount attacks. In this paper, we show that high precision and good run-time performance are not mutually exclusive. We present HARD, a precise and efficient hardware-assisted implementation of DSR. HARD distinguishes a larger number of equivalence classes, and incurs lower run-time overhead than software-only DSR. Our implementation achieves run-time overheads of just 6.61% on average, while the software version with the same protection costs 40.96%.

Cite

CITATION STYLE

APA

Belleville, B., Moon, H., Shin, J., Hwang, D., Nash, J. M., Jung, S., … Franz, M. (2018). Hardware assisted randomization of data. In Lecture Notes in Computer Science (Vol. 11050 LNCS, pp. 337–358). Springer Verlag. https://doi.org/10.1007/978-3-030-00470-5_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free