Visible to the public A red team blue team approach towards a secure processor design with hardware shadow stack

TitleA red team blue team approach towards a secure processor design with hardware shadow stack
Publication TypeConference Paper
Year of Publication2017
AuthorsBresch, C., Michelet, A., Amato, L., Meyer, T., Hély, D.
Conference Name2017 IEEE 2nd International Verification and Security Workshop (IVSW)
PublisherIEEE
ISBN Number978-1-5386-1708-3
Keywordscomposability, Computer architecture, Computer bugs, embedded system security, Embedded systems, Hardware, hardware shadow stack, hardware-software codesign, memory corruption, Metrics, object oriented security, object-oriented programming, open processor architectures, openrisc, Payloads, private data access, processor architecture, processor design security, processor vulnerabilities, pubcrawl, red team blue team approach, reduced instruction set computing, resilience, Resiliency, return oriented programming attack, RISC-V, security, security of data, software attacks, Trusted Computing
Abstract

Software attacks are commonly performed against embedded systems in order to access private data or to run restricted services. In this work, we demonstrate some vulnerabilities of commonly use processor which can be leveraged by hackers to attack a system. The targeted devices are based on open processor architectures OpenRISC and RISC-V. Several software exploits are discussed and demonstrated while a hardware countermeasure is proposed and validated on OpenRISC against Return Oriented Programming attack.

URLhttps://ieeexplore.ieee.org/document/8031545
DOI10.1109/IVSW.2017.8031545
Citation Keybresch_red_2017