373 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author조영필-
dc.date.accessioned2022-10-14T02:24:57Z-
dc.date.available2022-10-14T02:24:57Z-
dc.date.issued2021-01-
dc.identifier.citationJOURNAL OF SUPERCOMPUTING, v. 77, no. 7, page. 7287-7314en_US
dc.identifier.issn0920-8542; 1573-0484en_US
dc.identifier.urihttps://link.springer.com/article/10.1007/s11227-020-03542-1en_US
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/175384-
dc.description.abstractIn recent years, there is a growing need to protect security and privacy of the data against various attacks on software running on smart mobile devices. As of today, the code-reuse attack (CRA) is known as one of the most sophisticated techniques. We in this paper propose a hardware-assisted solution that can be practically deployed into the existing ARM-based mobile devices. We exploit CoreSight debug interface to obtain the core internal information. As the information fed from the debug interface is insufficient for our purpose to detect CRAs, our solution uses the metadata to supplement the lacking information. However, most metadata-driven approaches suffer from the significant storage overhead to store every basic information describing the original data that is vital to their analysis or techniques. As this large space overhead can be a major obstacle to the general acceptance of our solution in ARM-based devices with strict performance constraints, we have endeavored to develop a technique minimizing the memory overhead. Also, we have extended our solution to apply to multiprocessor SoCs as the growing number of computing systems including mobile devices use multiprocessor architectures. Experimental results show that our solution detects CRAs with 1.74% performance overhead in dual-CPU system and requires only 5.66% more memories for storing metadata.en_US
dc.description.sponsorshipThis work was supported in part by the Institute of Information and Communications Technology Planning and Evaluation (IITP) Grant Funded by the Korean Government (MSIT) under Grant 2018-0-00230 (Development on Autonomous Trust Enhancement Technology of IoT Device and Study on Adaptive IoT Security Open Architecture based on Global Standardization [TrusThingz Project]) and Grant 2017-0-00213 (Development of Cyber Self Mutation Technologies for Proactive Cyber Defense), in part by the National Research Foundation of Korea (NRF) Grant Funded by the Korean Government (MSIT) under Grant NRF-2020R1A2B5B03095204 and Grant NRF-2018R1D1A1B07049870, in part by the BK21 Plus program of the Creative Research Engineer Development for IT, Seoul National University in 2020, in part by the EDA tool from the IC Design Education Center (IDEC), South Korea, and in part by the research fund of Hanyang University (HY-2020).en_US
dc.language.isoenen_US
dc.publisherSPRINGERen_US
dc.subjectSecurity of ARM-based device; Code-reuse attack; Return-oriented programming; Jump-oriented programming; Metadataen_US
dc.titleA metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessorsen_US
dc.typeArticleen_US
dc.identifier.doi10.1007/s11227-020-03542-1en_US
dc.relation.page7287-7314-
dc.relation.journalJOURNAL OF SUPERCOMPUTING-
dc.contributor.googleauthorOh, Hyunyoung-
dc.contributor.googleauthorCho, Yeongpil-
dc.contributor.googleauthorPaek, Yunheung-
dc.relation.code2021008831-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF ENGINEERING[S]-
dc.sector.departmentSCHOOL OF COMPUTER SCIENCE-
dc.identifier.pidypcho-
Appears in Collections:
COLLEGE OF ENGINEERING[S](공과대학) > COMPUTER SCIENCE(컴퓨터소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE