A Static CFG Extraction Scheme for RISC-V Runtime CFI

Wenxin Li, Weike Wang, Senyang Li, Zhenliang An
{"title":"A Static CFG Extraction Scheme for RISC-V Runtime CFI","authors":"Wenxin Li, Weike Wang, Senyang Li, Zhenliang An","doi":"10.1109/ISSSR58837.2023.00073","DOIUrl":null,"url":null,"abstract":"The Control Flow Graph represents all possible paths a program may take during execution. Control Flow Integrity is a critical concern in embedded system security, and the CFG can be integrated with hardware circuit design to validate CFI. In this paper, we present a static CFG extraction scheme for RISC-V program based on the executable files. During the construction of CFGs, information such as instructions in each basic blocks, basic block length, transfer instructions of basic blocks, and transfer targets can be extracted. Additionally, data such as hash values for basic blocks can be calculated. Those metadata elements are sensitive information for the subsequent runtime CFI check. We use this extraction scheme to perform static analysis on several benchmark programs, and experimental results demonstrate that this scheme can generate correct CFGs and key sensitive information for runtime CFI verification.","PeriodicalId":185173,"journal":{"name":"2023 9th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 9th International Symposium on System Security, Safety, and Reliability (ISSSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSSR58837.2023.00073","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Control Flow Graph represents all possible paths a program may take during execution. Control Flow Integrity is a critical concern in embedded system security, and the CFG can be integrated with hardware circuit design to validate CFI. In this paper, we present a static CFG extraction scheme for RISC-V program based on the executable files. During the construction of CFGs, information such as instructions in each basic blocks, basic block length, transfer instructions of basic blocks, and transfer targets can be extracted. Additionally, data such as hash values for basic blocks can be calculated. Those metadata elements are sensitive information for the subsequent runtime CFI check. We use this extraction scheme to perform static analysis on several benchmark programs, and experimental results demonstrate that this scheme can generate correct CFGs and key sensitive information for runtime CFI verification.
面向RISC-V运行时CFI的静态CFG提取方案
控制流程图表示程序在执行过程中可能采取的所有可能路径。控制流完整性是嵌入式系统安全的关键问题,可以将控制流完整性与硬件电路设计相结合来验证控制流完整性。本文提出了一种基于可执行文件的RISC-V程序静态CFG提取方案。在构建CFGs的过程中,可以提取各个基本块中的指令、基本块长度、基本块的迁移指令、迁移目标等信息。此外,还可以计算基本块的散列值等数据。这些元数据元素是后续运行时CFI检查的敏感信息。利用该提取方案对多个基准程序进行了静态分析,实验结果表明,该方案能够生成正确的cfg和关键敏感信息,用于运行时CFI验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信