A Technique Preventing Code Reuse Attacks Based on RISC Processor

Yang Li,Zi-bin Dai,Jun-wei Li
DOI: https://doi.org/10.12783/dtcse/ccnt2018/24682
2018-01-01
DEStech Transactions on Computer Science and Engineering
Abstract:A full-process tag inspection system was designed and experimentally verified. This system based on RISC processors can defend code reuse attacks, as well as prevent high overhead caused by the implementation of software fine-grained control flow integrity technology. By extending memory tag, adding special memory-access instructions and setting up security rules, this design achieves hardware-based fine-grained control flow integrity, which can defend against attacks of ROP, JOP and COOP. The experimental measurement have been performed to validate that this design has effective effect on defending CRA with low overhead, which is evaluated on the RISC-V platform.
What problem does this paper attempt to address?