Corpus ID: 10031799

Execution Integrity with In-Place Encryption

  title={Execution Integrity with In-Place Encryption},
  author={Dean Sullivan and Orlando Arias and D. Gens and L. Davi and A. Sadeghi and Yier Jin},
  • Dean Sullivan, Orlando Arias, +3 authors Yier Jin
  • Published 2017
  • Computer Science
  • ArXiv
  • Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data execution prevention (DEP) as well as code-reuse attacks became more prevalent. In this paper, we show that ISR can be extended to also protect against code-reuse attacks while at the same time offering security guarantees similar to those of… CONTINUE READING
    4 Citations
    Control-Flow Carrying Code
    • 2
    Securing conditional branches in the presence of fault attacks
    • 7
    • PDF
    SaeCAS: Secure Authenticated Execution Using CAM-Based Vector Storage


    Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM
    • 80
    • PDF
    No-Execute-After-Read: Preventing Code Disclosure in Commodity Software
    • 45
    • PDF
    Missing the Point(er): On the Effectiveness of Code Pointer Integrity
    • 123
    • PDF
    Where's the FEEB? The Effectiveness of Instruction Set Randomization
    • 173
    • PDF
    ASIST: architectural support for instruction set randomization
    • 40
    • Highly Influential
    • PDF
    ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks
    • 97
    • PDF
    Code-Pointer Integrity
    • 329
    • Highly Influential
    • PDF
    Out of Control: Overcoming Control-Flow Integrity
    • 317
    • PDF
    It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
    • 99
    • PDF
    Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization
    • 218
    • PDF