Corpus ID: 10031799

Execution Integrity with In-Place Encryption

  title={Execution Integrity with In-Place Encryption},
  author={Dean Sullivan and Orlando Arias and D. Gens and L. Davi and A. Sadeghi and Yier Jin},
  • Dean Sullivan, Orlando Arias, +3 authors Yier Jin
  • Published 2017
  • Computer Science
  • ArXiv
  • Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data execution prevention (DEP) as well as code-reuse attacks became more prevalent. In this paper, we show that ISR can be extended to also protect against code-reuse attacks while at the same time offering security guarantees similar to those of… CONTINUE READING
    Control-Flow Carrying Code
    • 1
    Securing conditional branches in the presence of fault attacks
    • 6
    • PDF


    Publications referenced by this paper.
    Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM
    • 78
    • PDF
    No-Execute-After-Read: Preventing Code Disclosure in Commodity Software
    • 45
    • PDF
    Missing the Point(er): On the Effectiveness of Code Pointer Integrity
    • 121
    • PDF
    ASIST: architectural support for instruction set randomization
    • 37
    • Highly Influential
    • PDF
    ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks
    • 97
    • PDF
    Code-Pointer Integrity
    • 319
    • Highly Influential
    • PDF
    Out of Control: Overcoming Control-Flow Integrity
    • 313
    • PDF
    It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
    • 97
    • PDF
    Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization
    • 215
    • PDF