PMU-extended Hardware ROP Attack Detection
Title | PMU-extended Hardware ROP Attack Detection |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Li, W., Li, M., Ma, Y., Yang, Q. |
Conference Name | 2018 12th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID) |
ISBN Number | 978-1-5386-6063-8 |
Keywords | arbitrary code execution, composability, Control Flow Integrity, data execution prevention mechanism, Human Behavior, low-cost hardware ROP detection approach, object oriented security, object-oriented programming, performance monitoring unit, PMU-extended hardware ROP attack detection, pubcrawl, Resiliency, return oriented programming, rop attacks, Scalability, security of data, short instruction sequences, software security |
Abstract | Return Oriented Programming is one of the major challenges for software security nowadays. It can bypass Data Execution Prevention (DEP) mechanism by chaining short instruction sequences from existing code together to induce arbitrary code execution. Existing defenses are usually trade-offs between practicality, security, and performance. In this paper, we propose PMUe, a low-cost hardware ROP detection approach that detects ROP attack based on three inherent properties of ROP. It is transparent to user applications and can be regarded as a small extension to existing Performance Monitoring Unit in commodity processors. Our evaluation demonstrates that PMUe can effectively detect ROP attack with negligible performance overhead. |
URL | https://ieeexplore.ieee.org/document/8693210 |
DOI | 10.1109/ICASID.2018.8693210 |
Citation Key | li_pmu-extended_2018 |
- PMU-extended hardware ROP attack detection
- software security
- short instruction sequences
- security of data
- Scalability
- rop attacks
- return oriented programming
- Resiliency
- pubcrawl
- object oriented security
- performance monitoring unit
- object-oriented programming
- low-cost hardware ROP detection approach
- Human behavior
- data execution prevention mechanism
- Control Flow Integrity
- composability
- arbitrary code execution