首页> 外文期刊>ACM Transactions on Design Automation of Electronic Systems >Using CoreSight PTM to Integrate CRA Monitoring IPs in an ARM-Based SoC
【24h】

Using CoreSight PTM to Integrate CRA Monitoring IPs in an ARM-Based SoC

机译:使用Coresight PTM将CRA监控IP集成在基于ARM的SoC中

获取原文
获取原文并翻译 | 示例
           

摘要

The ARM CoreSight Program Trace Macrocell (PTM) has been widely deployed in recent ARM processors for real-time debugging and tracing of software. Using PTM, the external debugger can extract execution behaviors of applications running on an ARM processor. Recently, some researchers have been using this feature for other purposes, such as fault-tolerant computation and security monitoring. This motivated us to develop an external security monitor that can detect control hijacking attacks, of which the goal is to maliciously manipulate the control flow of victim applications at an attacker's disposal. This article focuses on detecting a special type of attack called code reuse attacks (CRA), which use a recently introduced technique that allows attackers to perform arbitrary computation without injecting their code by reusing only existing code fragments. Our external monitor is attached to the outside of the host system via the system bus and ARM CoreSight PTM, and is fed with execution traces of a victim application running on the host. As a majority of CRAs violates the normal execution behaviors of a program, our monitor constantly watches and analyzes the execution traces of the victim application and detects a symptom of attacks when the execution behaviors violate certain rules that normal applications are known to adhere. We present two different implementations for this purpose: a hardware-based solution in which all CRA detection components are implemented in hardware, and a hardware/software mixed solution that can be employed in a more resource-constrained environment where the deployment of full hardware-level CRA detection is burdensome.
机译:ARM Coresight Program Trace Macrocell(PTM)已广泛部署在最近的ARM处理器中,用于实时调试和软件跟踪。使用PTM,外部调试器可以提取在ARM处理器上运行的应用程序的执行行为。最近,一些研究人员已经使用此功能进行其他目的,例如容错计算和安全监控。这激励我们开发一个可以检测控制劫持攻击的外部安全监视器,其中目标是恶意操纵受害者应用的控制流程。本文侧重于检测特殊类型的攻击,称为代码重用攻击(CRA),该攻击使用最近引入的技术允许攻击者执行任意计算而不通过重用现有的代码片段来注入代码。我们的外部监视器通过系统总线和ARM CoreSight PTM连接到主机系统的外部,并在主机上运行的受害者应用程序的执行迹线供给。由于大多数CRAS违反了程序的正常执行行为,我们的监视器不断地观看并分析受害者应用程序的执行迹线,并在执行行为违反某些规则时检测攻击的症状,该规则是已知正常应用程序粘附的某些规则。我们为此目的展示了两个不同的实现:所有CRA检测组件都以硬件实现的基于硬件的解决方案,以及可以在更资源受限的环境中使用的硬件/软件混合解决方案,其中何处进行全部硬件 - 水平CRA检测是繁重的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号