Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology
Code Reuse Attacks (CRA) represent a type of control flow hijacking that attackers exploit to manipulate the standard program execution path, resulting in abnormal processor behaviors. In response to the security concern, proposals for Control Flow Integrity (CFI) verification have emerged. The CFI...
| Published in: | IEEE Access |
|---|---|
| Main Authors: | Senyang Li, Weike Wang, Wenxin Li, Dexue Zhang |
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2023-01-01
|
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10328880/ |
Similar Items
Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance
by: Zhenliang An, et al.
Published: (2023-07-01)
by: Zhenliang An, et al.
Published: (2023-07-01)
Control-flow integrity technology based on the combination of software and hardware
by: LIANG Hao, et al.
Published: (2024-10-01)
by: LIANG Hao, et al.
Published: (2024-10-01)
Control-Flow Integrity: Attacks and Protections
by: Sarwar Sayeed, et al.
Published: (2019-10-01)
by: Sarwar Sayeed, et al.
Published: (2019-10-01)
BGCFI: Efficient Verification in Fine-Grained Control-Flow Integrity Based on Bipartite Graph
by: Moon Chan Park, et al.
Published: (2023-01-01)
by: Moon Chan Park, et al.
Published: (2023-01-01)
A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems
by: Qiang Hao, et al.
Published: (2022-08-01)
by: Qiang Hao, et al.
Published: (2022-08-01)
Timing and Speculative Execution Attacks: Defeating State-of-the-Art Code-Reuse Defenses
by: Zhang Tianning, et al.
Published: (2025-01-01)
by: Zhang Tianning, et al.
Published: (2025-01-01)
Mitigation of software errors produced by radiation from the space environment
by: German Castro
Published: (2023-06-01)
by: German Castro
Published: (2023-06-01)
Bratter: An Instruction Set Extension for Forward Control-Flow Integrity in RISC-V
by: Seonghwan Park, et al.
Published: (2022-02-01)
by: Seonghwan Park, et al.
Published: (2022-02-01)
Survey of software anomaly detection based on deception
by: Jianming FU, et al.
Published: (2022-02-01)
by: Jianming FU, et al.
Published: (2022-02-01)
Survey of software anomaly detection based on deception
by: FU Jianming, LIU Chang, XIE Mengfei, LUO Chenke
Published: (2022-02-01)
by: FU Jianming, LIU Chang, XIE Mengfei, LUO Chenke
Published: (2022-02-01)
A Novel and Fast Hardware Implementation for Golay Code Encoder
by: Morteza Nazeri, et al.
Published: (2018-01-01)
by: Morteza Nazeri, et al.
Published: (2018-01-01)
Hardware–Software Partitioning for Real-Time Object Detection Using Dynamic Parameter Optimization
by: Corneliu Zaharia, et al.
Published: (2023-05-01)
by: Corneliu Zaharia, et al.
Published: (2023-05-01)
Requirements for symmetric block encryption algorithms developed for software and hardware implementation
by: Kairat Sakanuly Sakan, et al.
Published: (2021-12-01)
by: Kairat Sakanuly Sakan, et al.
Published: (2021-12-01)
Assessment of dental fluorosis in schoolchildren using a community index (CFI)
by: V. V. Belyaev, et al.
Published: (2020-04-01)
by: V. V. Belyaev, et al.
Published: (2020-04-01)
Embedded Systems and their Vulnerabilities to Hardware Attacks
by: Konrad Szczepankiewicz, et al.
Published: (2023-03-01)
by: Konrad Szczepankiewicz, et al.
Published: (2023-03-01)
A Side-Channel Protected and High-Performance Hardware Implementation for EdDSA25519
by: Pablo Navarro-Torrero, et al.
Published: (2025-01-01)
by: Pablo Navarro-Torrero, et al.
Published: (2025-01-01)
Software diversification method based on binary rewriting
by: Benwei HE, et al.
Published: (2023-04-01)
by: Benwei HE, et al.
Published: (2023-04-01)
Software diversification method based on binary rewriting
by: Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU
Published: (2023-04-01)
by: Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU
Published: (2023-04-01)
Binary Code-Oriented Fine-Grained Software Diversification Method
by: Benwei HE, Yunfei GUO, Hao LIANG, Qingfeng WANG
Published: (2024-01-01)
by: Benwei HE, Yunfei GUO, Hao LIANG, Qingfeng WANG
Published: (2024-01-01)
Digital Image Decoder for Efficient Hardware Implementation
by: Goran Savić, et al.
Published: (2022-12-01)
by: Goran Savić, et al.
Published: (2022-12-01)
Hardware and Software Implementation for Solar Hot Water System in Northern Regions of Russia
by: Nikolay Tsvetkov, et al.
Published: (2022-02-01)
by: Nikolay Tsvetkov, et al.
Published: (2022-02-01)
Software diversity evaluating method based on gadget feature analysis
by: Genlin XIE, et al.
Published: (2023-06-01)
by: Genlin XIE, et al.
Published: (2023-06-01)
Software diversity evaluating method based on gadget feature analysis
by: Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG
Published: (2023-06-01)
by: Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG
Published: (2023-06-01)
Novel Hardware Implementation of Deduplicating Visually Identical JPEG Image Chunks
by: Thang Luong, et al.
Published: (2024-01-01)
by: Thang Luong, et al.
Published: (2024-01-01)
Hardware implementation of RSA encryption algorithm based on pipeline
by: Yang Longfei, et al.
Published: (2024-01-01)
by: Yang Longfei, et al.
Published: (2024-01-01)
On the Hardware–Software Integration in Cryptographic Accelerators for Industrial IoT
by: Luigi Leonardi, et al.
Published: (2022-10-01)
by: Luigi Leonardi, et al.
Published: (2022-10-01)
Hardware reconfigurable coding and evolution algorithm based on evolvable hardware
by: Ting WANG, et al.
Published: (2012-08-01)
by: Ting WANG, et al.
Published: (2012-08-01)
Hardware reconfigurable coding and evolution algorithm based on evolvable hardware
by: Ting WANG, et al.
Published: (2012-08-01)
by: Ting WANG, et al.
Published: (2012-08-01)
A Novel System Reliability Modeling of Hardware, Software, and Interactions of Hardware and Software
by: Mengmeng Zhu, et al.
Published: (2019-11-01)
by: Mengmeng Zhu, et al.
Published: (2019-11-01)
Hardware Security in IoT Devices with Emphasis on Hardware Trojans
by: Simranjeet Sidhu, et al.
Published: (2019-08-01)
by: Simranjeet Sidhu, et al.
Published: (2019-08-01)
A modified MixColumn-InversMixColumn in AES algorithm suitable for hardware implementation using FPGA device
by: Ragiel Hadi Prayitno, et al.
Published: (2023-12-01)
by: Ragiel Hadi Prayitno, et al.
Published: (2023-12-01)
Psychometric Properties of the Career Futures Inventory (CFI-25) Among Undergraduate Students in Oman
by: yousef Abu shindig, et al.
Published: (2023-06-01)
by: yousef Abu shindig, et al.
Published: (2023-06-01)
A Candidate Prognostic Biomarker Complement Factor I Promotes Malignant Progression in Glioma
by: Xiaomin Cai, et al.
Published: (2021-02-01)
by: Xiaomin Cai, et al.
Published: (2021-02-01)
STUDY OF HARDWARE-IMPLEMENTED CONVOLUTIONAL NEURAL NETWORKS OF THE U-NET CLASS
by: Ivan V. Zoev, et al.
Published: (2023-03-01)
by: Ivan V. Zoev, et al.
Published: (2023-03-01)
A Flexible Hardware Accelerator for Booth Polynomial Multiplier
by: Omar S. Sonbul
Published: (2024-04-01)
by: Omar S. Sonbul
Published: (2024-04-01)
High-speed hardware architecture design and implementation of Ed25519 signature verification algorithm
by: Yiming XUE, et al.
Published: (2022-03-01)
by: Yiming XUE, et al.
Published: (2022-03-01)
High-speed hardware architecture design and implementation of Ed25519 signature verification algorithm
by: Yiming XUE, et al.
Published: (2022-03-01)
by: Yiming XUE, et al.
Published: (2022-03-01)
Design and implementation of points position cloud calculation based on software-hardware co-design
by: He Ruibin, et al.
Published: (2019-03-01)
by: He Ruibin, et al.
Published: (2019-03-01)
Comparing the potentials of the different canola flower indices for canola mapping based on Landsat 9 images
by: Haifeng Tian, et al.
Published: (2024-12-01)
by: Haifeng Tian, et al.
Published: (2024-12-01)
Novel Benes Network Routing Algorithm and Hardware Implementation
by: Dimitris Nikolaidis, et al.
Published: (2022-01-01)
by: Dimitris Nikolaidis, et al.
Published: (2022-01-01)
Similar Items
-
Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance
by: Zhenliang An, et al.
Published: (2023-07-01) -
Control-flow integrity technology based on the combination of software and hardware
by: LIANG Hao, et al.
Published: (2024-10-01) -
Control-Flow Integrity: Attacks and Protections
by: Sarwar Sayeed, et al.
Published: (2019-10-01) -
BGCFI: Efficient Verification in Fine-Grained Control-Flow Integrity Based on Bipartite Graph
by: Moon Chan Park, et al.
Published: (2023-01-01) -
A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems
by: Qiang Hao, et al.
Published: (2022-08-01)
