In-process Memory Isolation Using Hardware Watchpoint

Proceedings of the 56th Annual Design Automation Conference 2019(2019)

引用 5|浏览29
暂无评分
摘要
Memory disclosure vulnerabilities have been exploited in the leaking of application secret data such as crypto keys (e.g., the Heartbleed Bug). To ameliorate this problem, we propose an in-process memory isolation mechanism by leveraging a common hardwarefeature, namely, hardware debugging. Specifically, we utilize a watchpoint to monitor a particular memory region containing secret data. We implemented the PoC of our approach based on the 64-bit ARM architecture, including the kernel patches and user APIs that help developers benefit from isolated memory use. We applied the approach to open-source applications such as OpenSSL and AESCrypt. The results of a performance evaluation show that our approach incurs a small amount of overhead.
更多
查看译文
关键词
memory disclosure vulnerabilities,application secret data,crypto keys,in-process memory isolation mechanism,hardware debugging,64-bit ARM architecture,isolated memory use,hardware watchpoint,kernel patches,user APIs
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要