skip to main content
10.1145/2966986.2966991guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

A hardware-based technique for efficient implicit information flow tracking

Published: 07 November 2016 Publication History

Abstract

To access sensitive information, some recent advanced attacks have been successful in exploiting implicit flows in a program in which sensitive data affects the control path and in turn affects other data. To track the sensitive data through implicit flows, several software and hardware based approaches have been proposed, but they suffer from the non-negligible performance overhead. In this paper, we propose a hardware tracking engine for implicit flow, called the implicit flow tracking unit (IFTU). By adopting the tracking scheme for implicit flow and mapping it to the specialized hardware, our solution can efficiently perform the implicit flow tracking with reasonable area costs.

9. References

[1]
ARM. Embedded Trace Macrocell Architecture Specification, 2011.
[2]
Y.-Y. Chen. Architecture for data-centric security. PhD thesis, Citeseer, 2012.
[3]
Y.-Y. Chen, P. A. Jamkhedkar, and R. B. Lee. A software-hardware architecture for self-protecting data. In Proceedings of the 2012 ACM conference on Computerand communications security, pages 14–27. ACM, 2012.
[4]
M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: a flexible information flow architecture for software security. In ACM SIGARCH Computer Architecture News, volume 35, pages 482–493. ACM, 2007.
[5]
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. X. Song. Dynamic spyware analysis. In USENIX annual technical conference, pages 233–246, 2007.
[6]
M. G. Kang, S. McCamant, P. Poosankam, and D. Song. Dta++: Dynamic taint analysis with targeted control-flow propagation. In NDSS, 2011.
[7]
R. B. P. Laskov. Detection of intrusions and malware & vulnerability assessment. 2006.
[8]
J. Lee, I. Heo, Y. Lee, and Y. Paek. Efficient dynamic information flow tracking on a processor with core debug interface. In Proceedings of the 52nd Annual Design Automation Conference, page 79. ACM, 2015.
[9]
J. Lee, Y. Lee, H. Moon, I. Heo, and Y. Paek. Extrax: Security extention to extract cache resident information for snoop-based external monitors. In Design Automation and Test in Europe Conference and Exhibition (DATE), 2015.
[10]
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. 2005.
[11]
F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, and Y. Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In Microarchitecture, 2006. MICRO-39. 39th Annual IEEE/ACM International Symposium on, pages 135–148. IEEE, 2006.
[12]
A. Sabelfeld and A. C. Myers. Language-based information-flow security. Selected Areas in Communications, IEEE Journal on, 21 (1): 5–19, 2003.
[13]
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In ACM SIGOPS Operating Systems Review, volume 38, pages 85–96. ACM, 2004.
[14]
M. Tiwari, X. Li, H. M. Wassel, F. T. Chong, and T. Sherwood. Execution leases: A hardware-supported mechanism for enforcing strong non-interference. In Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture, pages 493–504. ACM, 2009.
[15]
M. Tiwari, H. M. Wassel, B. Mazloom, S. Mysore, F. T. Chong, and T. Sherwood. Complete information flow tracking from the gates up. In ACM Sigplan Notices, volume 44, pages 109–120. ACM, 2009.
[16]
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In Microarchitecture, 2004. MICRO-37 2004. 37th International Symposium on, pages 243–254. IEEE, 2004.
[17]
I. Xilinx. Microblaze processor reference guide v13.4. reference manual, 2011.
[18]
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM conference on Computerand communications security, pages 116–127. ACM, 2007.
[19]
Y. Zhu, J. Jung, D. Song, T. Kohno, and D. Wetherall. Privacy Scope: A precise information flow tracking system for finding application leaks. PhD thesis, University of California, Berkeley, 2009.

Cited By

View all
  • (2024)TATOO: A Flexible Hardware Platform for Binary-Only FuzzingProceedings of the 61st ACM/IEEE Design Automation Conference10.1145/3649329.3655946(1-6)Online publication date: 23-Jun-2024
  • (2021)Dynamic Information Flow Tracking: Taxonomy, Challenges, and OpportunitiesMicromachines10.3390/mi1208089812:8(898)Online publication date: 29-Jul-2021
  • (2021)Hardware Information Flow TrackingACM Computing Surveys10.1145/344786754:4(1-39)Online publication date: 3-May-2021
  • Show More Cited By

Index Terms

  1. A hardware-based technique for efficient implicit information flow tracking
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
      Nov 2016
      946 pages

      Publisher

      IEEE Press

      Publication History

      Published: 07 November 2016

      Permissions

      Request permissions for this article.

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 19 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)TATOO: A Flexible Hardware Platform for Binary-Only FuzzingProceedings of the 61st ACM/IEEE Design Automation Conference10.1145/3649329.3655946(1-6)Online publication date: 23-Jun-2024
      • (2021)Dynamic Information Flow Tracking: Taxonomy, Challenges, and OpportunitiesMicromachines10.3390/mi1208089812:8(898)Online publication date: 29-Jul-2021
      • (2021)Hardware Information Flow TrackingACM Computing Surveys10.1145/344786754:4(1-39)Online publication date: 3-May-2021
      • (2020)Building a portable deeply-nested implicit information flow trackingProceedings of the 17th ACM International Conference on Computing Frontiers10.1145/3387902.3392614(150-157)Online publication date: 11-May-2020
      • (2019)LATCHProceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture10.1145/3352460.3358327(969-982)Online publication date: 12-Oct-2019
      • (2019)Runtime Hardware Security Verification Using Approximate Computing: A Case Study on Video Motion Detection2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)10.1109/AsianHOST47458.2019.9006675(1-6)Online publication date: Dec-2019
      • (2019)Theorem proof based gate level information flow tracking for hardware security verificationComputers and Security10.1016/j.cose.2019.05.00585:C(225-239)Online publication date: 1-Aug-2019

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media