RISC-V ISA기반 ROP(Return-Oriented Programming) 공격의 Gadget 분석Analysis of Return-Oriented Programming Attack Gadget Composed of RISC-V Instruction Set Architecture
- Other Titles
- Analysis of Return-Oriented Programming Attack Gadget Composed of RISC-V Instruction Set Architecture
- Authors
- 공원배; 김동규
- Issue Date
- Aug-2020
- Publisher
- 대한전자공학회
- Citation
- 2020 대한전자공학회 하계학술대회, pp.573 - 575
- Indexed
- OTHER
- Journal Title
- 2020 대한전자공학회 하계학술대회
- Start Page
- 573
- End Page
- 575
- URI
- https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/1790
- Abstract
- After the RISC-V Instruction Set Architecture (ISA) was released as a royalty-free in Berkeley in 2010, across academia and industry have researched in a variety of fields, including microarchitecture, communication, image processing, and deep learning. Among them, research on security has become essential because the device can directly affect the user's life with the development of IoT and the development of automotive cars. However, because it is still in its infancy, security studies on RISC-V ISA are less than others. ReturnOriented Programming (ROP) attack is a very powerful and easy attack in traditional. In this paper, we analyze the benchmark of RISC-V ISA using the XROP program which is the return-oriented programming gadget finder.
- Files in This Item
-
Go to Link
- Appears in
Collections - 서울 공과대학 > 서울 융합전자공학부 > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.