HW-CDI

Hard-Wired Control Data Integrity

Yongsuk Lee, Kyung Ho Lee

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Ensuring that a program follows an uncompromised control flow at the machine instruction level can provide sound protection from control flow attacks that transfer a control flow to the attacker's flow during program execution. This paper proposes an enhanced control data protection for control flow integrity called hard wired control data integrity (HW-CDI). The HW-CDI hides the control data via encoding with a key and requires proper decoding with the key for a correct control flow transfer. A unique aspect of HW-CDI is that this key changes in terms of not only the location but also the value of the control data. This paper describes the features necessary to make HW-CDI, an effective approach for securing program control flows with low-performance overhead. More specifically, this paper describes how to incorporate the HW-CDI into the processor's instruction pipeline so that it becomes an integral part of indirect branch instruction execution. It also provides information on how to generate the encoding/decoding keys without additional instrumented code. The HW-CDI is able to differentiate control flow transfer instances, providing context-based protection at negligible performance overhead.

Original languageEnglish
Article number8606926
Pages (from-to)10811-10822
Number of pages12
JournalIEEE Access
Volume7
DOIs
Publication statusPublished - 2019 Jan 1

Fingerprint

Flow control
Decoding
Data privacy
Pipelines
Acoustic waves

Keywords

  • Control data
  • control flow integrity
  • indirect branch
  • instruction set architecture
  • software security

ASJC Scopus subject areas

  • Computer Science(all)
  • Materials Science(all)
  • Engineering(all)

Cite this

HW-CDI : Hard-Wired Control Data Integrity. / Lee, Yongsuk; Lee, Kyung Ho.

In: IEEE Access, Vol. 7, 8606926, 01.01.2019, p. 10811-10822.

Research output: Contribution to journalArticle

Lee, Yongsuk ; Lee, Kyung Ho. / HW-CDI : Hard-Wired Control Data Integrity. In: IEEE Access. 2019 ; Vol. 7. pp. 10811-10822.
@article{fa352b417dfb408f80e6022eab9274af,
title = "HW-CDI: Hard-Wired Control Data Integrity",
abstract = "Ensuring that a program follows an uncompromised control flow at the machine instruction level can provide sound protection from control flow attacks that transfer a control flow to the attacker's flow during program execution. This paper proposes an enhanced control data protection for control flow integrity called hard wired control data integrity (HW-CDI). The HW-CDI hides the control data via encoding with a key and requires proper decoding with the key for a correct control flow transfer. A unique aspect of HW-CDI is that this key changes in terms of not only the location but also the value of the control data. This paper describes the features necessary to make HW-CDI, an effective approach for securing program control flows with low-performance overhead. More specifically, this paper describes how to incorporate the HW-CDI into the processor's instruction pipeline so that it becomes an integral part of indirect branch instruction execution. It also provides information on how to generate the encoding/decoding keys without additional instrumented code. The HW-CDI is able to differentiate control flow transfer instances, providing context-based protection at negligible performance overhead.",
keywords = "Control data, control flow integrity, indirect branch, instruction set architecture, software security",
author = "Yongsuk Lee and Lee, {Kyung Ho}",
year = "2019",
month = "1",
day = "1",
doi = "10.1109/ACCESS.2019.2891762",
language = "English",
volume = "7",
pages = "10811--10822",
journal = "IEEE Access",
issn = "2169-3536",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - JOUR

T1 - HW-CDI

T2 - Hard-Wired Control Data Integrity

AU - Lee, Yongsuk

AU - Lee, Kyung Ho

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Ensuring that a program follows an uncompromised control flow at the machine instruction level can provide sound protection from control flow attacks that transfer a control flow to the attacker's flow during program execution. This paper proposes an enhanced control data protection for control flow integrity called hard wired control data integrity (HW-CDI). The HW-CDI hides the control data via encoding with a key and requires proper decoding with the key for a correct control flow transfer. A unique aspect of HW-CDI is that this key changes in terms of not only the location but also the value of the control data. This paper describes the features necessary to make HW-CDI, an effective approach for securing program control flows with low-performance overhead. More specifically, this paper describes how to incorporate the HW-CDI into the processor's instruction pipeline so that it becomes an integral part of indirect branch instruction execution. It also provides information on how to generate the encoding/decoding keys without additional instrumented code. The HW-CDI is able to differentiate control flow transfer instances, providing context-based protection at negligible performance overhead.

AB - Ensuring that a program follows an uncompromised control flow at the machine instruction level can provide sound protection from control flow attacks that transfer a control flow to the attacker's flow during program execution. This paper proposes an enhanced control data protection for control flow integrity called hard wired control data integrity (HW-CDI). The HW-CDI hides the control data via encoding with a key and requires proper decoding with the key for a correct control flow transfer. A unique aspect of HW-CDI is that this key changes in terms of not only the location but also the value of the control data. This paper describes the features necessary to make HW-CDI, an effective approach for securing program control flows with low-performance overhead. More specifically, this paper describes how to incorporate the HW-CDI into the processor's instruction pipeline so that it becomes an integral part of indirect branch instruction execution. It also provides information on how to generate the encoding/decoding keys without additional instrumented code. The HW-CDI is able to differentiate control flow transfer instances, providing context-based protection at negligible performance overhead.

KW - Control data

KW - control flow integrity

KW - indirect branch

KW - instruction set architecture

KW - software security

UR - http://www.scopus.com/inward/record.url?scp=85061174953&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85061174953&partnerID=8YFLogxK

U2 - 10.1109/ACCESS.2019.2891762

DO - 10.1109/ACCESS.2019.2891762

M3 - Article

VL - 7

SP - 10811

EP - 10822

JO - IEEE Access

JF - IEEE Access

SN - 2169-3536

M1 - 8606926

ER -