학술논문

Evaluating the Effectiveness of Obfuscated Instruction Codes for Malware Resistance
Document Type
Conference
Source
2023 Intermountain Engineering, Technology and Computing (IETC) Intermountain Engineering, Technology and Computing (IETC), 2023. :67-72 May, 2023
Subject
Aerospace
Bioengineering
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineered Materials, Dielectrics and Plasmas
Engineering Profession
Fields, Waves and Electromagnetics
General Topics for Engineers
Geoscience
Nuclear Engineering
Photonics and Electrooptics
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Transportation
Resistance
Codes
Instruction sets
Force
Prototypes
Computer architecture
Malware
Computing
CPU central processing unit
OS command injection
cyber security
endpoint security
cyber-attack
attack detection
FPGA
Language
Abstract
Malware and maliciously crafted user input represent serious threats to modern computer systems. Many attacks begin with difficult-to-prevent vulnerabilities, such as code injection or memory corruption, usually achieved by exploiting known bugs in specific programs. We introduce a novel processor architecture which utilizes obfuscated hardware in order to effectively detect altered memory contents before they can be executed. This detection system also uses hardware reconfigura-bility to its advantage, providing the flexibility to counteract other attack vectors relying on code execution and demonstrating significant resistance to brute-force attacks. In addition, we present a prototype architectural implementation as an initial demonstration of feasibility.