Shakti-T: A RISC-V Processor with Light Weight Security Extensions
Citations
55 citations
Cites background from "Shakti-T: A RISC-V Processor with L..."
...Some prior arts extended RISC-V to domainspecific accelerators/coprocessors [22], [27]–[29]....
[...]
29 citations
Cites background from "Shakti-T: A RISC-V Processor with L..."
...Shakti-T [8] employs the concept of base and bounds to ensure that pointers access only valid memory regions....
[...]
14 citations
Cites background or methods from "Shakti-T: A RISC-V Processor with L..."
...Although [23] enhances a RISC-V processor to efficiently implement memory checks, the software support required for [23] is extremely complex....
[...]
...On the other hand, hardware solutions like [23, 25] reduce the run time overhead at the cost of hardware complexity....
[...]
...Safety Check Instrumentation Methods Metadata Size Performance Overheads Spatial Temporal Hardware Compiler Hardware Software [33] ✔ × × ✔ 128*n NA NA [27] ✔ ✔ × ✔ 256*n + 64 NA 29% [25] ✔ ✔ ✔ ✔ 256*n + 64 NA 25% [23] ✔ ✔ ✔ × 64*n + 128 0% NA [7] ✔ × ✔ × 128*n NA 10% Shakti-MS ✔ ✔ ✔ ✔ 128*n 0% 13%...
[...]
...Further, unlike [25], we are not using any separate shadow memory space and unlike [23], there are no additional tables or tag bits that are required in the processor to store pointer metadata....
[...]
12 citations
Cites background or methods from "Shakti-T: A RISC-V Processor with L..."
...On the other hand, ISA extensions such as Shakti-T [9] and Watchdog Lite [10] aim at mitigating pointer hijacking....
[...]
...First, those that use specific toolchains, compilers [9], [10] or library to adapt an applica-...
[...]
...To identify pointers, Shakti-T, and Watchdog Lite need to instrument the code in advance using compiler modification....
[...]
9 citations
References
483 citations
"Shakti-T: A RISC-V Processor with L..." refers background in this paper
...As the manifestations of buffer-overflow evolved over time, such as return-to-libc [30] and Return Oriented Programming (ROP) [29], several software defined solutions came into existence....
[...]
...Though literature shows that ASLR has proven to be the most effective and widely adopted technique for protection against ROP based attacks, there do exist well known attacks that either leak sensitive information [32] or change the control flow [18] by bypassing ASLR....
[...]
460 citations
"Shakti-T: A RISC-V Processor with L..." refers background in this paper
...There exists numerous software solutions [3, 19, 25, 39, 2] which implement fat-pointers for security....
[...]
458 citations
Additional excerpts
...Some of the proposed solutions include: stack canaries [8]; encryption of the code pointer [9]; storing the return address in a shadow stack [11, 33, 12]; re-arranging argument locations, return addresses, previous frame pointers and local variables [34]; control flow integrity checks [1]; and, Address Space Layout Randomization (ASLR) [31]....
[...]
383 citations
"Shakti-T: A RISC-V Processor with L..." refers background in this paper
...There exists numerous software solutions [3, 19, 25, 39, 2] which implement fat-pointers for security....
[...]
355 citations
"Shakti-T: A RISC-V Processor with L..." refers methods in this paper
...This is achieved by associating an identifier with every pointer and using a lock-and-key mechanism similar to the ones proposed in software [22, 4]....
[...]