Dr Lee Speakman L.Speakman@salford.ac.uk
Lecturer in Cyber Security
Attacks stemming from software vulnerabilities that cause memory corruption often result in control flow hijacks and hold a place of notoriety in software exploitation. Attackers take advantage of vulnerabilities due to programming flaws to execute malicious code for redirecting the intended execution flow of applications. Existing defences offer limited protection due to their specificity to system architecture, operating systems or hardware requirements and are often circumvented by increasingly sophisticated attack techniques. This paper focuses on securing applications that are built on and run on the Reduced Instruction Set Computer Five (RISC-V pronounced risk-five) architecture, which is fast becoming popular on embedded devices such as smartphones, tablets, or other Internet of Things. Studies have revealed different threats that could emerge in an environment that is based on RISC-V architecture, drawing attention to growing demands for more resilient protections for RISC-V binaries. A concept based on Control Flow Integrity (CFI) appears to give promising solutions to control flow hijacks via various forms of implementation. The innovation in this research proposes an implementation of CFI with scrambled labels and logging of rogue attempts on vulnerable RISC-V-based applications. This would subsequently be extended for peer/reciprocal monitoring between similar binaries on RISC-V platforms.
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 20th European Conference on Cyber Warfare and Security |
Start Date | Jun 24, 2021 |
End Date | Jun 25, 2021 |
Acceptance Date | Apr 13, 2021 |
Online Publication Date | Jun 24, 2021 |
Publication Date | Jun 24, 2021 |
Deposit Date | Mar 7, 2025 |
Publisher | Academic Conferences and Publishing International |
Peer Reviewed | Peer Reviewed |
DOI | https://doi.org/10.34190/EWS.21.115 |
Keywords | control flow integrity, RISC-V, buffer overflow, memory corruption, cybersecurity |
Looping in OLSRv2 in Mobile Ad-Hoc Networks, Loop Suppession and Loop Correction
(2009)
Journal Article
Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing
(2024)
Presentation / Conference Contribution
An analysis of loop formation in OLSRv2 in ad-hoc networks and limiting its negative impact
(2008)
Presentation / Conference Contribution
Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond
(2018)
Presentation / Conference Contribution
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search