A survey of Hardware-based Control Flow Integrity (CFI)

CFI is a computer security technique that detects runtime attacks by monitoring a program's branching behavior. This work presents a detailed analysis of the security policies enforced by 21 recent hardware-based CFI architectures. The goal is to evaluate the security, limitations, hardware cos...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:CoRR 2017, Vol.abs/1706.07257, p.1-27
Hauptverfasser: De Clercq, Ruan, Verbauwhede, Ingrid
Format: Text Resource
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 27
container_issue
container_start_page 1
container_title CoRR
container_volume abs/1706.07257
creator De Clercq, Ruan
Verbauwhede, Ingrid
description CFI is a computer security technique that detects runtime attacks by monitoring a program's branching behavior. This work presents a detailed analysis of the security policies enforced by 21 recent hardware-based CFI architectures. The goal is to evaluate the security, limitations, hardware cost, performance, and practicality of using these policies. We show that many architectures are not suitable for widespread adoption, since they have practical issues, such as relying on accurate control flow model (which is difficult to obtain) or they implement policies which provide only limited security.
format Text Resource
fullrecord <record><control><sourceid>kuleuven_FZOIL</sourceid><recordid>TN_cdi_kuleuven_dspace_123456789_636135</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>123456789_636135</sourcerecordid><originalsourceid>FETCH-kuleuven_dspace_123456789_6361353</originalsourceid><addsrcrecordid>eNrjZDB3VCguLSpLrVTIT1PwSCxKKU8sStVNSixOTVFwzs8rKcrPUXDLyS9X8MwrSU0vyiypVNBwdvPU5GFgTUvMKU7lhdLcDOpuriHOHrrZpTmppWWpefEpxQWJyanxhkbGJqZm5haW8WbGZobGpsbcDNrEqYwvqSgxJt5cAG8HPb0</addsrcrecordid><sourcetype>Institutional Repository</sourcetype><iscdi>true</iscdi><recordtype>text_resource</recordtype></control><display><type>text_resource</type><title>A survey of Hardware-based Control Flow Integrity (CFI)</title><source>Lirias (KU Leuven Association)</source><creator>De Clercq, Ruan ; Verbauwhede, Ingrid</creator><creatorcontrib>De Clercq, Ruan ; Verbauwhede, Ingrid</creatorcontrib><description>CFI is a computer security technique that detects runtime attacks by monitoring a program's branching behavior. This work presents a detailed analysis of the security policies enforced by 21 recent hardware-based CFI architectures. The goal is to evaluate the security, limitations, hardware cost, performance, and practicality of using these policies. We show that many architectures are not suitable for widespread adoption, since they have practical issues, such as relying on accurate control flow model (which is difficult to obtain) or they implement policies which provide only limited security.</description><language>eng</language><publisher>arXiv.org e-Print archive</publisher><ispartof>CoRR, 2017, Vol.abs/1706.07257, p.1-27</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>315,776,27837</link.rule.ids><linktorsrc>$$Uhttps://lirias.kuleuven.be/handle/123456789/636135$$EView_record_in_KU_Leuven_Association$$FView_record_in_$$GKU_Leuven_Association$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>De Clercq, Ruan</creatorcontrib><creatorcontrib>Verbauwhede, Ingrid</creatorcontrib><title>A survey of Hardware-based Control Flow Integrity (CFI)</title><title>CoRR</title><description>CFI is a computer security technique that detects runtime attacks by monitoring a program's branching behavior. This work presents a detailed analysis of the security policies enforced by 21 recent hardware-based CFI architectures. The goal is to evaluate the security, limitations, hardware cost, performance, and practicality of using these policies. We show that many architectures are not suitable for widespread adoption, since they have practical issues, such as relying on accurate control flow model (which is difficult to obtain) or they implement policies which provide only limited security.</description><fulltext>true</fulltext><rsrctype>text_resource</rsrctype><creationdate>2017</creationdate><recordtype>text_resource</recordtype><sourceid>FZOIL</sourceid><recordid>eNrjZDB3VCguLSpLrVTIT1PwSCxKKU8sStVNSixOTVFwzs8rKcrPUXDLyS9X8MwrSU0vyiypVNBwdvPU5GFgTUvMKU7lhdLcDOpuriHOHrrZpTmppWWpefEpxQWJyanxhkbGJqZm5haW8WbGZobGpsbcDNrEqYwvqSgxJt5cAG8HPb0</recordid><startdate>20170622</startdate><enddate>20170622</enddate><creator>De Clercq, Ruan</creator><creator>Verbauwhede, Ingrid</creator><scope>FZOIL</scope></search><sort><creationdate>20170622</creationdate><title>A survey of Hardware-based Control Flow Integrity (CFI)</title><author>De Clercq, Ruan ; Verbauwhede, Ingrid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-kuleuven_dspace_123456789_6361353</frbrgroupid><rsrctype>text_resources</rsrctype><prefilter>text_resources</prefilter><language>eng</language><creationdate>2017</creationdate><toplevel>online_resources</toplevel><creatorcontrib>De Clercq, Ruan</creatorcontrib><creatorcontrib>Verbauwhede, Ingrid</creatorcontrib><collection>Lirias (KU Leuven Association)</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>De Clercq, Ruan</au><au>Verbauwhede, Ingrid</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>A survey of Hardware-based Control Flow Integrity (CFI)</atitle><jtitle>CoRR</jtitle><date>2017-06-22</date><risdate>2017</risdate><volume>abs/1706.07257</volume><spage>1</spage><epage>27</epage><pages>1-27</pages><abstract>CFI is a computer security technique that detects runtime attacks by monitoring a program's branching behavior. This work presents a detailed analysis of the security policies enforced by 21 recent hardware-based CFI architectures. The goal is to evaluate the security, limitations, hardware cost, performance, and practicality of using these policies. We show that many architectures are not suitable for widespread adoption, since they have practical issues, such as relying on accurate control flow model (which is difficult to obtain) or they implement policies which provide only limited security.</abstract><cop>arXiv.org e-Print archive</cop><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof CoRR, 2017, Vol.abs/1706.07257, p.1-27
issn
language eng
recordid cdi_kuleuven_dspace_123456789_636135
source Lirias (KU Leuven Association)
title A survey of Hardware-based Control Flow Integrity (CFI)
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T15%3A03%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kuleuven_FZOIL&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=A%20survey%20of%20Hardware-based%20Control%20Flow%20Integrity%20(CFI)&rft.jtitle=CoRR&rft.au=De%20Clercq,%20Ruan&rft.date=2017-06-22&rft.volume=abs/1706.07257&rft.spage=1&rft.epage=27&rft.pages=1-27&rft_id=info:doi/&rft_dat=%3Ckuleuven_FZOIL%3E123456789_636135%3C/kuleuven_FZOIL%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true