Aktiviteetteja vuodessa
Abstrakti
Modern processors include high-performance cryptographic functionalities such as Intel's AES- NI and ARM's Pointer Authentication that allow programs to efficiently authenticate data held by the program. Pointer Authentication is already used to protect return addresses in recent Apple devices, but as yet these structures have seen little use for the protection of general program data. In this paper, we show how cryptographically-authenticated data structures can be used to protect against attacks based on memory corruption, and show how they can be efficiently realized using widely available hardware-assisted cryptographic mechanisms. We present realizations of secure stacks and queues with minimal overall performance overhead (3.4%-6.4% slowdown of the OpenCV core performance tests), and provide proofs of correctness.
Alkuperäiskieli | Englanti |
---|---|
Otsikko | Proceedings - 2022 IEEE Secure Development Conference, SecDev 2022 |
Kustantaja | IEEE |
Sivut | 30-44 |
Sivumäärä | 15 |
ISBN (elektroninen) | 978-1-6654-7182-4 |
DOI - pysyväislinkit | |
Tila | Julkaistu - 2022 |
OKM-julkaisutyyppi | A4 Artikkeli konferenssijulkaisussa |
Tapahtuma | IEEE Secure Development Conference - Atlanta, Yhdysvallat Kesto: 18 lokak. 2022 → 20 lokak. 2022 |
Conference
Conference | IEEE Secure Development Conference |
---|---|
Lyhennettä | SecDev |
Maa/Alue | Yhdysvallat |
Kaupunki | Atlanta |
Ajanjakso | 18/10/2022 → 20/10/2022 |
Sormenjälki
Sukella tutkimusaiheisiin 'Towards cryptographically-authenticated in-memory data structures'. Ne muodostavat yhdessä ainutlaatuisen sormenjäljen.Aktiviteetit
- 1 Kutsuttu akateeminen esitelmä
-
Design Across Layers: Achieving More by Joining Hardware, Software, and Cryptography
Gunn, L. (Puhuja)
11 syysk. 2023Aktiviteetti: Kutsuttu akateeminen esitelmä
Tiedosto