Integrated Circuits and Systems >
Backward-Edge Control Flow Integrity Based on Return Address Encryption
|
JUN HAN (Member, IEEE) |
Received date: 2025-01-31
Revised date: 2025-04-27
Accepted date: 2025-06-19
Online published: 2025-10-22
Supported by
National Natural Science Foundation of China under Grant(61934002)
National Natural Science Foundation of China under Grant(62234008)
Control flow integrity (CFI) plays an important role in defending against code reuse attacks (CRA). It protects the program’s control flow from being hijacked by restricting control flow transfers during execution. Specifically, backward-edge CFI safeguards return addresses to mitigate Return-Oriented Programming (ROP) attacks. In this work, we implement a backward-edge CFI mechanism that employs the Advanced Encryption Standard (AES) for cryptographic protection of return addresses. We utilize the gem5 simulator for architectural modeling and evaluation. Additionally, we design a dedicated AES hardware accelerator and integrate it into the system through gem5+RTL co-simulation. The AES accelerator is synthesized under TSMC 28 nm technology, which can work at 1GHz, with an area of 10045 μm2 and a power consumption of 1.31 mW. Experimental results indicate that the performance overhead of the backward-edge CFI scheme is less than 0.1%.
FENGSHUO TIAN , KAIXUAN WANG , JUN HAN . Backward-Edge Control Flow Integrity Based on Return Address Encryption[J]. Integrated Circuits and Systems, 2025 , 2(3) : 167 -173 . DOI: 10.23919/ICS.2025.3583689
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
|
| [10] |
|
| [11] |
|
| [12] |
Intel Corporation, “Control-flow enforcement technology preview,” 2016.[Online]. Available: https://software.intel.com/sites/default/files/ managed/4d/2a/control-flow-enforcement-technology-preview.pdf
|
| [13] |
|
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
|
| [18] |
|
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
|
/
| 〈 |
|
〉 |