Hacking the Control Flow error detection mechanism

Giorgio Di Natale 1 Marie-Lise Flottes 1 Sophie Dupuis 1 Bruno Rouzeyre 1
1 TEST - TEST
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
Abstract : Many techniques have been proposed in literature to cope with transient, permanent and malicious faults in computing systems. Among these techniques for reliability improvement and fault tolerance, Control Flow Checking allows covering any fault affecting the part of the storing elements containing the executable program, as well as all the hardware components handling the program itself and its flow. In [1] the authors proposed a low-overhead solution implementing hardware based control flow monitoring technique. They suggested that control flow error detection could be also used as a solution for enhancing the security of a computing system, preventing the insertion of malicious code in an application. In this paper we present a technique to map a malicious program into another one without structure violation and thus bypassing the control flow detection method.
Complete list of metadatas

https://hal-lirmm.ccsd.cnrs.fr/lirmm-01700739
Contributor : Giorgio Di Natale <>
Submitted on : Monday, February 5, 2018 - 11:09:14 AM
Last modification on : Monday, May 13, 2019 - 2:31:01 PM

Identifiers

Collections

Citation

Giorgio Di Natale, Marie-Lise Flottes, Sophie Dupuis, Bruno Rouzeyre. Hacking the Control Flow error detection mechanism. IVSW: International Verification and Security Workshop, Jul 2017, Thessaloniki, Greece. pp.51-56, ⟨10.1109/IVSW.2017.8031544⟩. ⟨lirmm-01700739⟩

Share

Metrics

Record views

189