(Created page with " == Abstract == Code injection attacks are an undeniable threat in today's cyberworld. Instruction Set Randomization (ISR) was initially proposed in 2003. This technique was...")
 
m (Scipediacontent moved page Draft Content 759493255 to Sancho Barrantes 2017a)
 
(No difference)

Latest revision as of 16:00, 3 February 2021

Abstract

Code injection attacks are an undeniable threat in today's cyberworld. Instruction Set Randomization (ISR) was initially proposed in 2003. This technique was designed to protect systems against code injection attacks by creating an unique instruction set for each machine, thanks to randomization. It is a promising technique in the growing embedded system and Internet of Things (IoT) devices ecosystem, where the lack of complex memory management make these devices more vulnerable. However, most of ISR implementations up to day are entirely software based. In this work, we implement hardware support for an ISR defense on an 32 bits, 5 pipeline stages MIPS processor (which is an embedded system compatible architecture). Two obfuscation schemes were implemented, one based on XOR encryption and the other on transposition. The hardware implementation was tested under synthetic code injection attacks and results shows the effectiveness of the defense using both encryption circuits.


Original document

The different versions of the original document can be found in:

https://dblp.uni-trier.de/db/conf/clei/clei2017.html#SanchoB17,
https://ieeexplore.ieee.org/document/8226448,
https://academic.microsoft.com/#/detail/2779900600
http://dx.doi.org/10.1109/clei.2017.8226448
Back to Top

Document information

Published on 01/01/2017

Volume 2017, 2017
DOI: 10.1109/clei.2017.8226448
Licence: Other

Document Score

0

Views 2
Recommendations 0

Share this document

Keywords

claim authorship

Are you one of the authors of this document?