Detailed Information

Cited 1 time in webofscience Cited 1 time in scopus
Metadata Downloads

Dynamic reencryption of return addresses

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Hyungyu-
dc.contributor.authorPyo, Changwoo-
dc.contributor.authorLee, Gyungho-
dc.date.available2020-07-10T04:02:34Z-
dc.date.created2020-07-06-
dc.date.issued2019-01-
dc.identifier.issn1751-8709-
dc.identifier.urihttps://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/2079-
dc.description.abstractThe authors present dynamic reencryption of return addresses to mitigate their leakage. The authors' method enforces programs to save return addresses as encrypted and renew the encryption states with fresh keys before or after vulnerable operations. When a function returns, it should restore the return address from its encryption using the most recent key not to cause a crash. Under the protection of their method, return addresses and keys may leak, but the disclosed bits become garbage because keys govern all return addresses through encryption, while changing before control-flow proceeds into a vulnerable region. As a result, it becomes probabilistically infeasible to build exploits for intercepting control-flow by using leaked return addresses or keys. They implemented the proposed method as an extension of the LLVM compiler that inserts reencryption code where necessary. They also have confirmed its effectiveness against information leak attacks carried out in the early stage of blind return-oriented programming (BROP). The performance overhead ranges below 11.6% for processor-intensive programs and 4.12% or less for web servers.-
dc.language영어-
dc.language.isoen-
dc.publisherINST ENGINEERING TECHNOLOGY-IET-
dc.subjectRANDOMIZATION-
dc.titleDynamic reencryption of return addresses-
dc.typeArticle-
dc.contributor.affiliatedAuthorPyo, Changwoo-
dc.identifier.doi10.1049/iet-ifs.2018.5142-
dc.identifier.scopusid2-s2.0-85059937961-
dc.identifier.wosid000455639700010-
dc.identifier.bibliographicCitationIET INFORMATION SECURITY, v.13, no.1, pp.76 - 85-
dc.relation.isPartOfIET INFORMATION SECURITY-
dc.citation.titleIET INFORMATION SECURITY-
dc.citation.volume13-
dc.citation.number1-
dc.citation.startPage76-
dc.citation.endPage85-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusRANDOMIZATION-
dc.subject.keywordAuthorcryptography-
dc.subject.keywordAuthordynamic reencryption-
dc.subject.keywordAuthorreturn address-
dc.subject.keywordAuthorfunction returns-
dc.subject.keywordAuthorleaked return addresses-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE