Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 조영필 | - |
dc.date.accessioned | 2022-10-14T02:24:57Z | - |
dc.date.available | 2022-10-14T02:24:57Z | - |
dc.date.issued | 2021-01 | - |
dc.identifier.citation | JOURNAL OF SUPERCOMPUTING, v. 77, no. 7, page. 7287-7314 | en_US |
dc.identifier.issn | 0920-8542; 1573-0484 | en_US |
dc.identifier.uri | https://link.springer.com/article/10.1007/s11227-020-03542-1 | en_US |
dc.identifier.uri | https://repository.hanyang.ac.kr/handle/20.500.11754/175384 | - |
dc.description.abstract | In recent years, there is a growing need to protect security and privacy of the data against various attacks on software running on smart mobile devices. As of today, the code-reuse attack (CRA) is known as one of the most sophisticated techniques. We in this paper propose a hardware-assisted solution that can be practically deployed into the existing ARM-based mobile devices. We exploit CoreSight debug interface to obtain the core internal information. As the information fed from the debug interface is insufficient for our purpose to detect CRAs, our solution uses the metadata to supplement the lacking information. However, most metadata-driven approaches suffer from the significant storage overhead to store every basic information describing the original data that is vital to their analysis or techniques. As this large space overhead can be a major obstacle to the general acceptance of our solution in ARM-based devices with strict performance constraints, we have endeavored to develop a technique minimizing the memory overhead. Also, we have extended our solution to apply to multiprocessor SoCs as the growing number of computing systems including mobile devices use multiprocessor architectures. Experimental results show that our solution detects CRAs with 1.74% performance overhead in dual-CPU system and requires only 5.66% more memories for storing metadata. | en_US |
dc.description.sponsorship | This work was supported in part by the Institute of Information and Communications Technology Planning and Evaluation (IITP) Grant Funded by the Korean Government (MSIT) under Grant 2018-0-00230 (Development on Autonomous Trust Enhancement Technology of IoT Device and Study on Adaptive IoT Security Open Architecture based on Global Standardization [TrusThingz Project]) and Grant 2017-0-00213 (Development of Cyber Self Mutation Technologies for Proactive Cyber Defense), in part by the National Research Foundation of Korea (NRF) Grant Funded by the Korean Government (MSIT) under Grant NRF-2020R1A2B5B03095204 and Grant NRF-2018R1D1A1B07049870, in part by the BK21 Plus program of the Creative Research Engineer Development for IT, Seoul National University in 2020, in part by the EDA tool from the IC Design Education Center (IDEC), South Korea, and in part by the research fund of Hanyang University (HY-2020). | en_US |
dc.language.iso | en | en_US |
dc.publisher | SPRINGER | en_US |
dc.subject | Security of ARM-based device; Code-reuse attack; Return-oriented programming; Jump-oriented programming; Metadata | en_US |
dc.title | A metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessors | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1007/s11227-020-03542-1 | en_US |
dc.relation.page | 7287-7314 | - |
dc.relation.journal | JOURNAL OF SUPERCOMPUTING | - |
dc.contributor.googleauthor | Oh, Hyunyoung | - |
dc.contributor.googleauthor | Cho, Yeongpil | - |
dc.contributor.googleauthor | Paek, Yunheung | - |
dc.relation.code | 2021008831 | - |
dc.sector.campus | S | - |
dc.sector.daehak | COLLEGE OF ENGINEERING[S] | - |
dc.sector.department | SCHOOL OF COMPUTER SCIENCE | - |
dc.identifier.pid | ypcho | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.