论文标题

快速执行嵌入式系统的仅执行内存

Fast Execute-Only Memory for Embedded Systems

论文作者

Shen, Zhuojia, Dharsee, Komail, Criswell, John

论文摘要

远程代码披露攻击威胁嵌入式系统,因为它们允许攻击者窃取知识产权或找到可重复使用的代码,以用于控制流劫持攻击。执行仅内存(XOM)可防止远程代码披露,但是现有的XOM解决方案要么需要一个在ARM嵌入式系统上无法使用的内存管理单元,要么需要大量的开销。 我们提出PICOXOM:用于ARMV7-M和ARMV8-M设备的快速新颖的XOM系统,该系统利用ARM的数据观察点和跟踪单元以及处理器的简化内存保护硬件。平均而言,Picoxom在两个基准套房和五个现实世界应用上造成0.33%的性能开销和5.89%的代码大小。

Remote code disclosure attacks threaten embedded systems as they allow attackers to steal intellectual property or to find reusable code for use in control-flow hijacking attacks. Execute-only memory (XOM) prevents remote code disclosures, but existing XOM solutions either require a memory management unit that is not available on ARM embedded systems or incur significant overhead. We present PicoXOM: a fast and novel XOM system for ARMv7-M and ARMv8-M devices which leverages ARM's Data Watchpoint and Tracing unit along with the processor's simplified memory protection hardware. On average, PicoXOM incurs 0.33% performance overhead and 5.89% code size overhead on two benchmark suites and five real-world applications.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源