Loading [MathJax]/extensions/MathMenu.js
A red team blue team approach towards a secure processor design with hardware shadow stack | IEEE Conference Publication | IEEE Xplore

A red team blue team approach towards a secure processor design with hardware shadow stack


Abstract:

Software attacks are commonly performed against embedded systems in order to access private data or to run restricted services. In this work, we demonstrate some vulnerab...Show More

Abstract:

Software attacks are commonly performed against embedded systems in order to access private data or to run restricted services. In this work, we demonstrate some vulnerabilities of commonly use processor which can be leveraged by hackers to attack a system. The targeted devices are based on open processor architectures OpenRISC and RISC-V. Several software exploits are discussed and demonstrated while a hardware countermeasure is proposed and validated on OpenRISC against Return Oriented Programming attack.
Date of Conference: 03-05 July 2017
Date Added to IEEE Xplore: 14 September 2017
ISBN Information:
Conference Location: Thessaloniki, Greece

Contact IEEE to Subscribe

References

References is not available for this document.