International audienceIn this paper we present a hardware based solution to verify simultaneously Code and Control-Flow Integrity (CCFI), aiming at protecting microcontrollers against both cyber-and physical attacks. This solution is non-intrusive as it does not require any modification of the CPU core. It relies on two additional hardware blocks external to the CPU: The first one – called CCFI-cache – acts as a dedicated cache for the storage of information to check the code and control-flow integrity, and the second one – CCFI-checker – performs control-flow and code integrity verification. Based on a RISC-V platform implementation, we show that the proposed scheme is able to perform online CCFI validation at the price of a small hardware...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Recently, the complexity of safety-critical cyber-physical systems has spiked due to an increasing d...
Cyber attacks are based on intrusions into digital systems by exploiting bugs to take control over t...
International audienceComputing devices became part of our daily world. But being physically accessi...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking atta...
Control-flow integrity (CFI) is a general defense against code-reuse exploits that currently constit...
We present a new system, KCoFI, that is the first we know of to provide complete Control-Flow Integr...
Abstract—Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijac...
Control-flow integrity (CFI) is considered as a general and promising method to prevent code-reuse a...
International audienceFault injection attacks have become a serious threat against embedded systems....
Computers were not built with security in mind. As such, security has and still often takes a back s...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Recently, the complexity of safety-critical cyber-physical systems has spiked due to an increasing d...
Cyber attacks are based on intrusions into digital systems by exploiting bugs to take control over t...
International audienceComputing devices became part of our daily world. But being physically accessi...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking atta...
Control-flow integrity (CFI) is a general defense against code-reuse exploits that currently constit...
We present a new system, KCoFI, that is the first we know of to provide complete Control-Flow Integr...
Abstract—Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijac...
Control-flow integrity (CFI) is considered as a general and promising method to prevent code-reuse a...
International audienceFault injection attacks have become a serious threat against embedded systems....
Computers were not built with security in mind. As such, security has and still often takes a back s...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Recently, the complexity of safety-critical cyber-physical systems has spiked due to an increasing d...