Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core
The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks. It is crucial to effectively detect these attacks to ensure the security of RISC-V systems. This stud...
Uloženo v:
| Vydáno v: | 2025 IEEE 26th Latin American Test Symposium (LATS) s. 1 - 6 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
11.03.2025
|
| Témata: | |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks. It is crucial to effectively detect these attacks to ensure the security of RISC-V systems. This study explores Hardware-Supported Malware Detection (HMD) techniques for identifying these security threats. Using the CV32e40p RISC-V platform, we conducted simulations to assess the effectiveness of anomaly-based HMD methods in detecting SBO attacks by analyzing hardware microarchitectural events. The findings demonstrate the potential of these approaches but also reveal significant challenges in detection performance. These elements are essential for advancing the security capabilities of HMD systems in RISC-V environments. |
|---|---|
| AbstractList | The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks. It is crucial to effectively detect these attacks to ensure the security of RISC-V systems. This study explores Hardware-Supported Malware Detection (HMD) techniques for identifying these security threats. Using the CV32e40p RISC-V platform, we conducted simulations to assess the effectiveness of anomaly-based HMD methods in detecting SBO attacks by analyzing hardware microarchitectural events. The findings demonstrate the potential of these approaches but also reveal significant challenges in detection performance. These elements are essential for advancing the security capabilities of HMD systems in RISC-V environments. |
| Author | Chenet, Cristiano Pegoraro Savino, Alessandro Di Carlo, Stefano |
| Author_xml | – sequence: 1 givenname: Cristiano Pegoraro orcidid: 0000-0003-3974-9310 surname: Chenet fullname: Chenet, Cristiano Pegoraro organization: Politecnico di Torino,Control and Computer Eng. Dep.,Torino,Italy – sequence: 2 givenname: Alessandro orcidid: 0000-0003-0529-7950 surname: Savino fullname: Savino, Alessandro organization: Politecnico di Torino,Control and Computer Eng. Dep.,Torino,Italy – sequence: 3 givenname: Stefano orcidid: 0000-0002-7512-5356 surname: Di Carlo fullname: Di Carlo, Stefano organization: Politecnico di Torino,Control and Computer Eng. Dep.,Torino,Italy |
| BookMark | eNo10EtOwzAYBGAjwQJKb4CEL5DiR2zH7EJaaKWiSqR0waZy4t8QEeLIdSndcnIoj9VInzSzmDN03PkOELqkZEQp0VfzfFlKwVM5YoSJ0TdJrrk-QkOtMiqlSJWSXJyizycIPhmbPZ6aYHcmQFJu-96HCBbfm_YgeAwR6tj4DnuHy2jqV3yzdQ4CXrxDcK3f4TweeHON8w7nfd82tfkpTD761jex6Z5xfAFcrDiDlPT4YVYWyQoXPsA5OnGm3cDwLwfo8XayLKbJfHE3K_J50lCVxaRyRLFKZCq1GmwmtKB1bYirKq0UASWBc2bBikzzKrPUMMoc49zWPE0r6fgAXfzuNgCw7kPzZsJ-_X8N_wJgAV51 |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/LATS65346.2025.10963939 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781665477635 1665477636 |
| EndPage | 6 |
| ExternalDocumentID | 10963939 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: European Union grantid: 101093062 funderid: 10.13039/501100000780 – fundername: European Union - NextGenerationEU grantid: PE00000014 funderid: 10.13039/100031478 |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i178t-bf072b5874d9ed85951cca0fbb9770e76e332ded5893b8d1a212f233dc344b6f3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001480998600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Apr 23 05:41:12 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i178t-bf072b5874d9ed85951cca0fbb9770e76e332ded5893b8d1a212f233dc344b6f3 |
| ORCID | 0000-0003-3974-9310 0000-0002-7512-5356 0000-0003-0529-7950 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_10963939 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-March-11 |
| PublicationDateYYYYMMDD | 2025-03-11 |
| PublicationDate_xml | – month: 03 year: 2025 text: 2025-March-11 day: 11 |
| PublicationDecade | 2020 |
| PublicationTitle | 2025 IEEE 26th Latin American Test Symposium (LATS) |
| PublicationTitleAbbrev | LATS |
| PublicationYear | 2025 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.9094971 |
| Snippet | The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Accuracy Buffer overflows Computer architecture Cybersecurity Detectors Hardware hardware-based detection Malware Principal component analysis Protection Real-time systems Resists RISC-V |
| Title | Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core |
| URI | https://ieeexplore.ieee.org/document/10963939 |
| WOSCitedRecordID | wos001480998600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA46PHhSceJv3sFrZtNkTettdg4FncPNMbxI0rzAUFrZOodX_3KTblM8ePBWXgMtea-8j77vy0fImdCZcECY0URmSF2HQqoDxSn3OkbUxpW0rswmZLcbj0ZJbylWr7QwiFiRz7DhL6tZvimymf9V5r5wVy4JT9bJupRyIdZacrbcrfPb1qAfNbnwzIOw2Vit_uWbUrWNztY_H7hN6j8CPOh9t5Ydsob5Lvl8wklB2-oD_Lh9riZIvSenZ8sauFOvPgJtLCtyVQ6FBYcksxe4nHkPFLh3RWtfizm0Sh-eXkArh9bP_BoqOt7Y06DBoUJIhzxEEbzBw00_pUNI3cvXyWPnapBe06WFAh0zGZdU20CGuhlLYRI0_iwz5lIWWK0d7gtQRsh5aNA0HWzRsWHKdTIbcm4yLoSOLN8jtbzIcZ9AbBQKFbEItRZSRTGz2iplubYmYxIPSN1v4PPb4pSM59XeHf4RPyKbPk2ez8XYMamVkxmekI3svRxPJ6dVbr8A4hqoKg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA1-gZ5UrPjtHLxGN5vsl7daLS3WWrSW4qUkmwkUy26pW8Wrv9xkbS0ePHhbZgO7ZGaZx857eYScCZUKC4QZTaIUqe1QSJUnOeVOx4hK25JWpdlE1G7H_X7SmYnVSy0MIpbkMzx3l-UsX-fp1P0qs1-4LZeEJ8tkNRDCZ99yrRlry968aFW7j2HAheMe-MH5fP0v55SycdQ3__nILVJZSPCg89NctskSZjvk8xknOb2WH-AG7u9ygtS5cjq-rIY7OXIRuMaipFdlkBuwWDJ9gaupc0GBe1u2ZpS_Q7Vw4ddLqGZQXUywoSTkDR0RGiwuhFqP-yi8MTw0H2u0BzX78hXyVL_p1hp0ZqJAhyyKC6qMF_kqiCOhE9TuNDNmk-YZpSzy8zAKkXNfow4scFGxZtL2MuNzrlMuhAoN3yUrWZ7hHoFYSxQyZCEqJSIZxswoI6XhyuiURbhPKm4DB-PvczIG8707-CN-StYb3bvWoNVs3x6SDZcyx-5i7IisFJMpHpO19K0Yvk5Oyjx_AcvBq3E |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2025+IEEE+26th+Latin+American+Test+Symposium+%28LATS%29&rft.atitle=Zero-Day+Hardware-Supported+Malware+Detection+of+Stack+Buffer+Overflow+Attacks%3A+An+Application+Exploiting+the+CV32e40p+RISC-V+Core&rft.au=Chenet%2C+Cristiano+Pegoraro&rft.au=Savino%2C+Alessandro&rft.au=Di+Carlo%2C+Stefano&rft.date=2025-03-11&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FLATS65346.2025.10963939&rft.externalDocID=10963939 |