Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core

The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks. It is crucial to effectively detect these attacks to ensure the security of RISC-V systems. This stud...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2025 IEEE 26th Latin American Test Symposium (LATS) s. 1 - 6
Hlavní autoři: Chenet, Cristiano Pegoraro, Savino, Alessandro, Di Carlo, Stefano
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 11.03.2025
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks. It is crucial to effectively detect these attacks to ensure the security of RISC-V systems. This study explores Hardware-Supported Malware Detection (HMD) techniques for identifying these security threats. Using the CV32e40p RISC-V platform, we conducted simulations to assess the effectiveness of anomaly-based HMD methods in detecting SBO attacks by analyzing hardware microarchitectural events. The findings demonstrate the potential of these approaches but also reveal significant challenges in detection performance. These elements are essential for advancing the security capabilities of HMD systems in RISC-V environments.
AbstractList The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks. It is crucial to effectively detect these attacks to ensure the security of RISC-V systems. This study explores Hardware-Supported Malware Detection (HMD) techniques for identifying these security threats. Using the CV32e40p RISC-V platform, we conducted simulations to assess the effectiveness of anomaly-based HMD methods in detecting SBO attacks by analyzing hardware microarchitectural events. The findings demonstrate the potential of these approaches but also reveal significant challenges in detection performance. These elements are essential for advancing the security capabilities of HMD systems in RISC-V environments.
Author Chenet, Cristiano Pegoraro
Savino, Alessandro
Di Carlo, Stefano
Author_xml – sequence: 1
  givenname: Cristiano Pegoraro
  orcidid: 0000-0003-3974-9310
  surname: Chenet
  fullname: Chenet, Cristiano Pegoraro
  organization: Politecnico di Torino,Control and Computer Eng. Dep.,Torino,Italy
– sequence: 2
  givenname: Alessandro
  orcidid: 0000-0003-0529-7950
  surname: Savino
  fullname: Savino, Alessandro
  organization: Politecnico di Torino,Control and Computer Eng. Dep.,Torino,Italy
– sequence: 3
  givenname: Stefano
  orcidid: 0000-0002-7512-5356
  surname: Di Carlo
  fullname: Di Carlo, Stefano
  organization: Politecnico di Torino,Control and Computer Eng. Dep.,Torino,Italy
BookMark eNo10EtOwzAYBGAjwQJKb4CEL5DiR2zH7EJaaKWiSqR0waZy4t8QEeLIdSndcnIoj9VInzSzmDN03PkOELqkZEQp0VfzfFlKwVM5YoSJ0TdJrrk-QkOtMiqlSJWSXJyizycIPhmbPZ6aYHcmQFJu-96HCBbfm_YgeAwR6tj4DnuHy2jqV3yzdQ4CXrxDcK3f4TweeHON8w7nfd82tfkpTD761jex6Z5xfAFcrDiDlPT4YVYWyQoXPsA5OnGm3cDwLwfo8XayLKbJfHE3K_J50lCVxaRyRLFKZCq1GmwmtKB1bYirKq0UASWBc2bBikzzKrPUMMoc49zWPE0r6fgAXfzuNgCw7kPzZsJ-_X8N_wJgAV51
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/LATS65346.2025.10963939
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781665477635
1665477636
EndPage 6
ExternalDocumentID 10963939
Genre orig-research
GrantInformation_xml – fundername: European Union
  grantid: 101093062
  funderid: 10.13039/501100000780
– fundername: European Union - NextGenerationEU
  grantid: PE00000014
  funderid: 10.13039/100031478
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i178t-bf072b5874d9ed85951cca0fbb9770e76e332ded5893b8d1a212f233dc344b6f3
IEDL.DBID RIE
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001480998600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Apr 23 05:41:12 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i178t-bf072b5874d9ed85951cca0fbb9770e76e332ded5893b8d1a212f233dc344b6f3
ORCID 0000-0003-3974-9310
0000-0002-7512-5356
0000-0003-0529-7950
PageCount 6
ParticipantIDs ieee_primary_10963939
PublicationCentury 2000
PublicationDate 2025-March-11
PublicationDateYYYYMMDD 2025-03-11
PublicationDate_xml – month: 03
  year: 2025
  text: 2025-March-11
  day: 11
PublicationDecade 2020
PublicationTitle 2025 IEEE 26th Latin American Test Symposium (LATS)
PublicationTitleAbbrev LATS
PublicationYear 2025
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.9094971
Snippet The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Accuracy
Buffer overflows
Computer architecture
Cybersecurity
Detectors
Hardware
hardware-based detection
Malware
Principal component analysis
Protection
Real-time systems
Resists
RISC-V
Title Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core
URI https://ieeexplore.ieee.org/document/10963939
WOSCitedRecordID wos001480998600005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA46PHhSceJv3sFrZtNkTettdg4FncPNMbxI0rzAUFrZOodX_3KTblM8ePBWXgMtea-8j77vy0fImdCZcECY0URmSF2HQqoDxSn3OkbUxpW0rswmZLcbj0ZJbylWr7QwiFiRz7DhL6tZvimymf9V5r5wVy4JT9bJupRyIdZacrbcrfPb1qAfNbnwzIOw2Vit_uWbUrWNztY_H7hN6j8CPOh9t5Ydsob5Lvl8wklB2-oD_Lh9riZIvSenZ8sauFOvPgJtLCtyVQ6FBYcksxe4nHkPFLh3RWtfizm0Sh-eXkArh9bP_BoqOt7Y06DBoUJIhzxEEbzBw00_pUNI3cvXyWPnapBe06WFAh0zGZdU20CGuhlLYRI0_iwz5lIWWK0d7gtQRsh5aNA0HWzRsWHKdTIbcm4yLoSOLN8jtbzIcZ9AbBQKFbEItRZSRTGz2iplubYmYxIPSN1v4PPb4pSM59XeHf4RPyKbPk2ez8XYMamVkxmekI3svRxPJ6dVbr8A4hqoKg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA1-gZ5UrPjtHLxGN5vsl7daLS3WWrSW4qUkmwkUy26pW8Wrv9xkbS0ePHhbZgO7ZGaZx857eYScCZUKC4QZTaIUqe1QSJUnOeVOx4hK25JWpdlE1G7H_X7SmYnVSy0MIpbkMzx3l-UsX-fp1P0qs1-4LZeEJ8tkNRDCZ99yrRlry968aFW7j2HAheMe-MH5fP0v55SycdQ3__nILVJZSPCg89NctskSZjvk8xknOb2WH-AG7u9ygtS5cjq-rIY7OXIRuMaipFdlkBuwWDJ9gaupc0GBe1u2ZpS_Q7Vw4ddLqGZQXUywoSTkDR0RGiwuhFqP-yi8MTw0H2u0BzX78hXyVL_p1hp0ZqJAhyyKC6qMF_kqiCOhE9TuNDNmk-YZpSzy8zAKkXNfow4scFGxZtL2MuNzrlMuhAoN3yUrWZ7hHoFYSxQyZCEqJSIZxswoI6XhyuiURbhPKm4DB-PvczIG8707-CN-StYb3bvWoNVs3x6SDZcyx-5i7IisFJMpHpO19K0Yvk5Oyjx_AcvBq3E
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2025+IEEE+26th+Latin+American+Test+Symposium+%28LATS%29&rft.atitle=Zero-Day+Hardware-Supported+Malware+Detection+of+Stack+Buffer+Overflow+Attacks%3A+An+Application+Exploiting+the+CV32e40p+RISC-V+Core&rft.au=Chenet%2C+Cristiano+Pegoraro&rft.au=Savino%2C+Alessandro&rft.au=Di+Carlo%2C+Stefano&rft.date=2025-03-11&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FLATS65346.2025.10963939&rft.externalDocID=10963939