259 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author조영필-
dc.date.accessioned2021-03-22T06:01:40Z-
dc.date.available2021-03-22T06:01:40Z-
dc.date.issued2019-08-
dc.identifier.citationProceedings of the 28th USENIX Security Symposium, page. 231-247en_US
dc.identifier.isbn978-1-939133-06-9-
dc.identifier.urihttps://www.usenix.org/conference/usenixsecurity19/presentation/kwon-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/160759-
dc.description.abstractCode disclosure attacks are one of the major threats to a computer system, considering that code often contains security sensitive information, such as intellectual properties (e.g., secret algorithm), sensitive data (e.g., cryptographic keys) and the gadgets for launching code reuse attacks. To stymie this class of attacks, security researchers have devised a strong memory protection mechanism, called eXecute-Only-Memory (XOM), that defines special memory regions where instruction execution is permitted but data reads and writes are prohibited. Reflecting the value of XOM, many recent high-end processors have added support for XOM in their hardware. Unfortunately, however, low-end embedded processors have yet to provide hardware support for XOM. In this paper, we propose a novel technique, named uXOM, that realizes XOM in a way that is secure and highly optimized to work on Cortex-M, which is a prominent processor series used in low-end embedded devices. uXOM achieves its security and efficiency by using special architectural features in Cortex-M: unprivileged memory instructions and an MPU. We present several challenges in making XOM nonbypassable under strong attackers and introduce our code analysis and instrumentation to solve these challenges. Our evaluation reveals that uXOM successfully realizes XOM in Cortex-M processor with much better efficiency in terms of execution time, code size and energy consumption compared to a software-only XOM implementation for Cortex-M.en_US
dc.description.sponsorshipThis work was partly supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (NRF-2017R1A2A1A17069478, NRF-2018R1D1A1B07049870, No. 2019R1C1C1006095), Institute of Information Communications Technology Planning Evaluation (IITP) grant funded by Korea government (Ministry of Science and ICT) (No. 2016-0-00078, No.2018-0-00230, No. 2017-0-00168), and the Brain Korea 21 Plus Project in 2019. The ICT at Seoul National University provides research facilities for this study.en_US
dc.language.isoenen_US
dc.publisherUSENIX Associationen_US
dc.titleuXOM: Efficient eXecute-Only Memory on ARM Cortex-Men_US
dc.typeArticleen_US
dc.relation.page231-247-
dc.contributor.googleauthorKwon, Donghyun-
dc.contributor.googleauthorShin, Jangseop-
dc.contributor.googleauthorKim, Giyeol-
dc.contributor.googleauthorLee, Byoungyoung-
dc.contributor.googleauthorCho, Yeongpil-
dc.contributor.googleauthorPaek, Yunheung-
dc.relation.code20190071-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF ENGINEERING[S]-
dc.sector.departmentDEPARTMENT OF COMPUTER SCIENCE-
dc.identifier.pidypcho-
Appears in Collections:
COLLEGE OF ENGINEERING[S](공과대학) > COMPUTER SCIENCE(컴퓨터소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE