Implementing an ISR defense on a MIPS architecture

Gespeichert in:
Bibliographische Detailangaben
Titel: Implementing an ISR defense on a MIPS architecture
Autoren: Sanabria Sancho, Loriana, Gabriela Barrantes, Elena
Publikationsjahr: 2017
Bestand: Universidad Nacional de La Plata (UNLP): SeDiCI (Servicio de Difusión de la Creación Intelectual)
Schlagwörter: Ciencias Informáticas, ISR, MIPS processor, encryption circuits, code injection attacks, Hardware
Beschreibung: Code injection attacks are an undeniable threat in today’s cyberworld. Instruction Set Randomization (ISR) was initially proposed in 2003. This technique was designed to protect systems against code injection attacks by creating an unique instruction set for each machine, thanks to randomization. It is a promising technique in the growing embedded system and Internet of Things (IoT) devices ecosystem, where the lack of complex memory management make these devices more vulnerable. However, most of ISR implementations up to day are entirely software based. In this work, we implement hardware support for an ISR defense on an 32 bits, 5 pipeline stages MIPS processor (which is an embedded system compatible architecture). Two obfuscation schemes were implemented, one based on XOR encryption and the other on transposition. The hardware implementation was tested under synthetic code injection attacks and results shows the effectiveness of the defense using both encryption circuits. ; Sociedad Argentina de Informática e Investigación Operativa (SADIO)
Publikationsart: conference object
Dateibeschreibung: application/pdf
Sprache: English
Relation: http://sedici.unlp.edu.ar/handle/10915/65514
Verfügbarkeit: http://sedici.unlp.edu.ar/handle/10915/65514
Rights: http://creativecommons.org/licenses/by-sa/4.0/ ; Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
Dokumentencode: edsbas.2E58981C
Datenbank: BASE
Beschreibung
Abstract:Code injection attacks are an undeniable threat in today’s cyberworld. Instruction Set Randomization (ISR) was initially proposed in 2003. This technique was designed to protect systems against code injection attacks by creating an unique instruction set for each machine, thanks to randomization. It is a promising technique in the growing embedded system and Internet of Things (IoT) devices ecosystem, where the lack of complex memory management make these devices more vulnerable. However, most of ISR implementations up to day are entirely software based. In this work, we implement hardware support for an ISR defense on an 32 bits, 5 pipeline stages MIPS processor (which is an embedded system compatible architecture). Two obfuscation schemes were implemented, one based on XOR encryption and the other on transposition. The hardware implementation was tested under synthetic code injection attacks and results shows the effectiveness of the defense using both encryption circuits. ; Sociedad Argentina de Informática e Investigación Operativa (SADIO)