ARM is becoming more popular in desktops and data centers, opening a new realm in terms of security attacks against ARM. ARM has released Pointer Authentication, a new hardware security feature that is intended to ensure pointer integrity with cryptographic primitives. In this paper, we utilize Pointer Authentication (PA) to build a novel scheme to completely prevent any misuse of security-sensitive pointers. We propose PACTight to tightly seal these pointers. PACTight utilizes a strong and unique modifier that addresses the current issues with the state-of-the-art PA defense mechanisms. We implement four defenses based on the PACTight mechanism. Our security and performance evaluation results show that PACTight defenses are more efficient and secure. Using real PA instructions, we evaluated PACTight on 30 different applications, including NGINX web server, with an average performance overhead of 4.07% even when enforcing our strongest defense. PACTight demonstrates its effectiveness and efficiency with real PA instructions on real hardware.
翻译:ARM在桌面和数据中心越来越受欢迎,打开了对ARM安全攻击的新领域。 ARM已经发布了一个新硬件安全特征的指针认证, 用于确保加密原始物的指针完整性。 在本文中, 我们利用指针认证(PA)来建立一个新颖的计划, 以完全防止滥用安全敏感指示器。 我们建议 PACTight 严格封存这些指示器。 PACTight 使用一个强大和独特的修饰器, 解决目前与最先进的PAPC防御机制有关的问题。 我们根据PACTight机制实施了四项防御。 我们的安全和性能评估结果表明, PACTight 防御系统的效率和安全性更高。 我们使用实际的 PACTight 指令, 评估了30个不同应用程序的PACTight, 包括 NGINX 网络服务器, 即使在我们实施最强的防御时, 平均性能管理率为4. 07%。 PACTight 以实际硬件的PA指令来证明其有效性和效率。