Towards cryptographically-authenticated in-memory data structures

10/20/2022
by   Setareh Ghorshi, et al.
0

Modern processors include high-performance cryptographic functionalities such as Intel's AES-NI and ARM's Pointer Authentication that allow programs to efficiently authenticate data held by the program. Pointer Authentication is already used to protect return addresses in recent Apple devices, but as yet these structures have seen little use for the protection of general program data. In this paper, we show how cryptographically-authenticated data structures can be used to protect against attacks based on memory corruption, and show how they can be efficiently realized using widely available hardware-assisted cryptographic mechanisms. We present realizations of secure stacks and queues with minimal overall performance overhead (3.4 core performance tests), and provide proofs of correctness.

READ FULL TEXT

page 9

page 10

page 11

page 13

page 14

research
12/23/2019

ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels

Code reuse attacks are still big threats to software and system security...
research
02/19/2020

PTAuth: Temporal Memory Safety via Robust Points-to Authentication

Temporal memory corruptions are commonly exploited software vulnerabilit...
research
03/07/2021

An Overview of Cryptographic Accumulators

This paper is a primer on cryptographic accumulators and how to apply th...
research
05/01/2020

Automatically Eliminating Speculative Leaks With Blade

We introduce BLADE, a new approach to automatically and efficiently synt...
research
11/22/2018

PAC it up: Towards Pointer Integrity using ARM Pointer Authentication

Run-time attacks against programs written in memory-unsafe programming l...
research
03/28/2022

Tightly Seal Your Sensitive Pointers with PACTight

ARM is becoming more popular in desktops and data centers, opening a new...
research
06/06/2023

TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors (Technical Report)

Platforms are nowadays typically equipped with tristed execution environ...

Please sign up or login with your details

Forgot password? Click here to reset