[SW Security] OBFSCURO: A Commodity Obfuscation Engine on Intel SGX, Network and Distributed System Security Symposium (NDSS), Feb. 2019

OBFSCURO: A Commodity Obfuscation Engine on Intel SGX, Network and Distributed System Security Symposium (NDSS), Feb. 2019


Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, Byoungyoung Lee


본 논문은 Trusted Computing 환경인 SGX 위에서 이론적으로 안전한 프로그램 obfuscation 기술을 제안한다. 프로그램의 데이터플로우, 컨트롤플로우가 모두 Oblivious RAM을 통하여 동작하므로, 최근 알려진 각종 사이드체널 공격 (페이지폴트 기반, 캐쉬 기반, 브랜치 프리딕터 기반 등)에도 안전하다.

0
0

International Papers

HW Security Architectural Supports to Protect OS Kernels from Code-Injection Attacks and Their Applications, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, Oct 2017
HW Security Hardware-assisted Efficient Long Branch Tracing for Control Flow Integrity on x86 Processors, Design Automation Conference WIP, Jun 2017
HW Security Using CoreSight PTM to Integrate CRA Monitoring IPs in an ARM-Based SoC, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, May 2017
HW Security Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping, IEEE Transactions on Dependable and Secure Computing, Apr 2017
HW Security Efficient Security Monitoring with Core Debug Interface in an Embedded Processor, ACM Transactions on Design Automation of Electronic Systems (TODAES), Dec 2016
HW Security A Hardware-based Technique for Efficient Implicit Information Flow Tracking, International Conference on Computer Aided Design (ICCAD), Nov. 2016 (Acceptance rate: 23%)
HW Security Architectural Supports to Protect OS Kernels from Code-Injection Attacks Hardware and Architectural Support for Security and Privacy (HASP), Jun 2016
HW Security A Hardware-based Technique for Efficient Implicit Information Flow Tracking, Design Automation Conference (DAC) WIP, Jun 2016
HW Security HDFI: Hardware-Assisted Data-flow Isolation, IEEE S&P , May 2016 (Acceptance rate: 13.3%)
HW Security Integration of ROP/JOP Monitoring IPs in an ARM-based SoC Design Automation and Test in Europe Conference and Exhibition (DATE), Mar 2016 (Acceptance rate: 24%)
HW Security 3D User Signature System Using Location Tracking Techniques, Global IT Conference, Jan 2016
HW Security The new real-time debug interface for efficient code reuse attack detection, 2015 International SoC Design Conference (ISOCC), 93-94, Nov 2015
HW Security Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines, ACM Transactions on Design Automation of Electronic Systems (TODAES), Sep 2015
HW Security Accelerating Bootstrapping in FHEW using GPUs, The 26th IEEE International Conference on Application-specific Systems, Architectures and Processors, IEEE ASAP Conference, Jul 2015(Acceptance rate: 24.7%)
HW Security Towards a Practical Solution to Detect Code Reuse Attacks on ARM Mobile Devices, In Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP, Jun 2015
HW Security Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping, IEEE Transactions on Dependable and Secure Computing, Jun 2015
HW Security Efficient Dynamic Information Flow Tracking on a Processor with Core Debug Interface, Design Automation Conference (DAC), Jun 2015 (Acceptance rate: 20.5%)
HW Security EXTRAX: Security Extention To Extract Cache Resident Information For Snoop-based External Monitors, Design Automation and Test in Europe Conference and Exhibition (DATE), Mar 2015 (Acceptance rate: 22.4%)
HW Security Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors, Journal of Semiconductor Technology and Science, JSTS-2014-035.R1, Feb 2015
HW Security CPU Security Extensions to Eliminate Cache Effect for Snoop-based Kernel Integrity Monitor, 51st IEEE/ACM Design Automation Conference, DAC WIP'14, Jun 2014