PAIRS: Control Flow Protection using Phantom Addressed Instructions

11/05/2019
by   Mohamed Tarek Ibn Ziad, et al.
0

Code-reuse attacks continue to pose a significant threat to systems security, from resource constrained environments to data-centers. Current mitigation techniques suffer from significant performance and energy overheads especially in the embedded domain. A viable alternative which, thus far, has been a software only mitigation, is Execution Path Randomization (EPR). The basic idea in EPR is to frequently switch between two distinct program variants forcing the attacker to gamble on which code to reuse. In this paper, we propose a novel technique, the Phantom Addressed Instructions that are Randomly Selected (PAIRS) that enables an efficient implementation of EPR with minor hardware adjustments and no source code modifications. For certain modes of operation, PAIRS does not require program re-compilation, thus is applicable to legacy binaries. Compared to state-of-the-art defenses, PAIRS has negligible performance overheads making it viable for embedded IoT devices up to server-grade systems.

READ FULL TEXT
research
02/19/2018

Sponge-Based Control-Flow Protection for IoT Devices

Embedded devices in the Internet of Things (IoT) face a wide variety of ...
research
04/26/2023

Thwarting Code-Reuse and Side-Channel Attacks in Embedded Systems

Embedded devices are increasingly present in our everyday life. They oft...
research
03/26/2019

Restricting Control Flow During Speculative Execution with Venkman

Side-channel attacks such as Spectre that utilize speculative execution ...
research
06/20/2023

Mitigating Speculation-based Attacks through Configurable Hardware/Software Co-design

New speculation-based attacks that affect large numbers of modern system...
research
10/27/2019

Silhouette: Efficient Intra-Address Space Isolation for Protected Shadow Stacks on Embedded Systems

Embedded systems are increasingly deployed in devices that can have phys...
research
12/12/2022

Detecting Code Injections in Noisy Environments Through EM Signal Analysis and SVD Denoising

The penetration of embedded devices in networks that support critical ap...

Please sign up or login with your details

Forgot password? Click here to reset