期刊文献+

PEC-V:基于RISC-V协处理器的内存溢出防御机制 被引量:1

PEC-V: Memory Overflow Defense Mechanism Based on RISC-V Coprocessor
下载PDF
导出
摘要 内存溢出攻击是计算机系统中历史悠久且依旧广泛存在的攻击手段,而指针加密技术可以有效阻止此攻击.通过软件手段实现这一技术的方式将导致程序运行效率的显著降低并且产生额外的内存开销.所以本文基于RocketChip的RoCC (Rocket Custom Coprocessor)接口实现一个加解密指针的协处理器PEC-V.其通过RISC-V的自定义指令控制协处理器加解密返回地址和函数指针等值达到阻止溢出攻击的目的. PEC-V主要使用PUF(Physical Unclonable Function)来避免在内存中储存加密指针的键值,所以此机制在保证了加密键值的随机性的同时也减少了访问内存的次数.实验结果显示, PEC-V能够有效防御各类缓冲区溢出攻击,且程序平均运行效率仅下降3%,相对既往方案显著提高了性能. In computer systems, the memory overflow attack is a long-existing security problem and is still common nowadays, which can be effectively hindered by pointer encryption. Nevertheless, the implementation of the technique by software significantly lowers the program running efficiency and leads to additional memory overhead. In this study, we develop an encrypted/decrypted pointer coprocessor PEC-V based on the Rocket Custom Coprocessor(RoCC) interface of RocketChip. The overflow attack can be prevented through the control of encryption/decryption of the return address and function pointer by the coprocessor under the user-defined instruction of RISC-V. PEC-V mainly depends on Physical Unclonable Function(PUF) to avoid storing the key value of the encrypted pointer in memory. Thus, this mechanism not only ensures the randomness of the key value, but also reduces the times of accessing memory. The experimental results show that PEC-V is defensive against various buffer overflow attacks while the program running efficiency is only reduced by approximately 3% on average, which is better than previous mechanisms.
作者 张雨昕 芮志清 李威威 张画 罗天悦 吴敬征 ZHANG Yu-Xin;RUI Zhi-Qing;LI Wei-Wei;ZHANG Hua;LUO Tian-Yue;WU Jing-Zheng(Intelligent Software Research Center,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China;The Grainger College of Engineering,University of Illinois at Urbana-Champaign,Urbana-Champaign,IL 61820,USA;PLCT Lab,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China;SHENYUAN Honors College,Beihang University,Beijing 100191,China)
出处 《计算机系统应用》 2021年第11期11-19,共9页 Computer Systems & Applications
基金 中国科学院战略性先导科技专项(C类)(XDC05040100) 国家自然科学基金(61772507) 2020年工业互联网创新发展工程(TC200H030)。
关键词 溢出攻击 指针加密 RISC-V RocketChip PUF PEC-V overflow attack pointer encryption RISC-V RocketChip Physical Unclonable Function(PUF) PEC-V
  • 相关文献

参考文献1

二级参考文献10

  • 1Wilander J,Kamkar M. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention[EB/OL]. http://www.mcs.csuhayward.edu/?simon/security/boflo.html, 2003
  • 2Cowan C, Wagle P, Pu C, Beattie S, Walpole J. Buffer overflows:Attacks and defenses for the vulnerability of the decade[C]. In:Proc. of the DARPA Information Survivability Conf. and Expo (DISCEX) ,Hilton Head, South Carolina, 2000.119-129
  • 3Fayolle P A,Glaume V. A Buffer Overflow Study Attacks & Defenses [ EB/OL ]. http://www. enseirb. fr/? glaume/indexen.html,2002
  • 4Jones R W M,Kelly P H J. Backwards-compatible bounds checking for arrays and pointers in C programs [C]. In: Third Intl.Workshop on Automated Debugging, 1997
  • 5Cowan C,Beattie S,Day R,Pu C,Wagle P,Walthinsen E. Protecting systems from stack smashing attacks with StackGuard [EB/OL]. http://www.cse.ogi.edu/?crispin/, 1999
  • 6Cowan C,Pu C,Maier D,Walpole J,Bakke P,Beattie S,Grier A,Wagle P ,Zhang Q,StackGuard H H. Automatic adaptive detection and prevention of buffer-overflow attacks [C]. In :Proc. of the 7thUSENIX Security Conf. San Antonio, Texas, 1998. 63 - 78
  • 7Cowan C,McNamee D,Black A,Pu C,Walpole J,Krasic C,Marlet R,Zhang Q. A Toolkit for Specializing Production Operating System Code [R]: [Technical Report CSE-97-004]. Dept. of Computer Science and Engineering,Oregon Graduate Institute, 1997
  • 8Cowan C,Beattie S,Johansen J,Wagle P. PointGuard: Protecting Pointers From Buffer Overflow [C]. In: the 12th USENIX Security Symposium,Washington DC,2003
  • 9Chiueh T C,Hsu F H. RAD. A compile-time solution to buffer overflow attacks [C]. In: Proc. of the 21th Intl. Conf. on Distributed Computing Systems (ICDCS). Phoenix,Arizona,USA,2001
  • 10Bulba, Kil3r. Bypassing StackGuard and Stackshield [J]. Phrack Magazine,1999(5): 56

共引文献3

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部