Hardware-assisted code-reuse-attack-resistant defence system and method

An attack defense system and code reuse technology, applied in the field of hardware-assisted anti-code reuse attack defense system, can solve the problems of high performance overhead of defense mechanism, security problems, secret key leakage, etc., and achieve low performance overhead and versatility. Good and safe effect

Active Publication Date: 2018-01-16
HUNAN UNIV
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In 2009, Francillon et al. proposed a defense technology to protect embedded systems from control flow attacks. This technology can protect the return address by combining stack separation technology and instruction-based memory control technology, thereby effectively preventing The control flow is maliciously tampered with, but this method needs to modify the ISA (program instruction set)
However, this mechanism has security problems such as secret key leakage.
[0014] To sum up, the performance overhead of the software-based defense mechanism is too high. Although the hardware-based defense mechanism can effectively reduce the performance overhead, it needs to modify the ISA and has security problems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware-assisted code-reuse-attack-resistant defence system and method
  • Hardware-assisted code-reuse-attack-resistant defence system and method
  • Hardware-assisted code-reuse-attack-resistant defence system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Such as figure 1 As shown, the hardware-assisted anti-code reuse attack defense system of the present invention includes a preprocessing module, a cache 1, a memory 2, a CPU 3, and an encryption and decryption framework 4, wherein,

[0049] Preprocessing module: before the program is loaded into the memory 2, the instructions at the destination address of all jmp instructions in the program source code and the instructions at the destination address of all call instructions are transmitted to the encryption and decryption framework 4; Read instructions in;

[0050] Memory 2: Transfer program instructions to cache 1 in real time during program execution;

[0051] The encryption and decryption framework 4 performs the following operations before the program is loaded into the memory 2: the first key key_1 and the second key key_2 are generated when the instruction at the destination address of the jmp instruction and the instruction at the destination address of the call...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware-assisted code-reuse-attack-resistant defence system and method, wherein the defence system comprises a pre-processing module, a cache, a memory, a CPU and an encryption and decryption architecture; and the encryption and decryption architecture comprises a PUF module, a first key register, a first length register, a second key register, a second length register,a PUF encryption module, a Hamming distance coding module, a Hamming distance decoding module, a decompression module and a judgment module. According to the hardware-assisted code-reuse-attack-resistant defence system and method disclosed by the invention, the ROP attack is resisted by utilizing and matching the Hamming distance between the return address of a program and a key; because the Hamming distance is coded, the security problem that an attacker can guess a key generated by the PUF module in a plaintext attack manner in the past work can be eliminated; therefore, the security is high; simultaneously, an instruction-level data hiding technology is applied to JOP attack defence; therefore, the performance cost is low; an instruction set does not need to be changed; the universalityis good; and the security is high.

Description

technical field [0001] The invention belongs to the technical field of software security, in particular to a hardware-assisted anti-code reuse attack defense system and method. Background technique [0002] The current popular code reuse attacks are mainly divided into ROP attacks and JOP attacks according to the different endings of the constructed code fragments. The ROP attack mainly ends with the ret instruction, and the JOP attack ends with the jmp instruction. Since Hovav Shacham proposed code reuse attack and proved that ROP attack is Turing complete in 2007, more and more researchers have begun to conduct in-depth research on code reuse attack and proposed many defense mechanisms. These defense mechanisms are mainly divided into two categories: software-based defense mechanisms and hardware-assisted defense mechanisms. [0003] (1) Software-based defense technology [0004] In 2009, Davi et al. proposed a new tool for detecting ROP: ROPdefender. ROPdefender consi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F21/76
Inventor 张吉良齐斌航王湘奇
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products