Acknowledgement
이 논문은 2024 년도 정부(과학기술정보통신부)의 재원으로 정보통신기획평가원의 지원을 받아 수행된 연구임 (No.2021-0-00724, 임베디드 시스템 악성코드 탐지·복원을 위한 RISC-V 기반 보안 CPU 아키텍처 핵심기술 개발)
References
- Lee Y, Waterman A, Cook H, Zimmer B, Keller B, Puggelli A, Kwak J, Jevtic R, Bailey S, Blagojevic M, Chiu PF. An agile approach to building RISC-V microprocessors. ieee Micro. 2016 Mar 18;36(2):8-20. https://doi.org/10.1109/MM.2016.11
- Mezger BW, Santos DA, Dilillo L, Zeferino CA, Melo DR. A survey of the RISC-V architecture software support. IEEE Access. 2022 May 10;10:51394-411. https://doi.org/10.1109/ACCESS.2022.3174125
- Rodrigues C, Marques I, Pinto S, Gomes T, Tavares A. Towards a heterogeneous fault-tolerance architecture based on arm and RISC-V processors. InIECON 2019-45th Annual Conference of the IEEE Industrial Electronics Society 2019 Oct 14 (Vol. 1, pp. 3112-3117). IEEE.
- Jung J, Kim B, Cho J, Lee B. A secure platform model based on ARM platform security architecture for IoT devices. IEEE Internet of Things Journal. 2021 Sep 1;9(7):5548-60. https://doi.org/10.1109/JIOT.2021.3109299
- Huang M, Song C. ARMPatch: A binary patching framework for ARM-based IoT devices. Journal of Web Engineering. 2021 Sep;20(6):1829-52. https://doi.org/10.13052/jwe1540-9589.2066
- Yu S, Chen W, Li L, Qin J. Development of ARM-based embedded system for robot applications. In2006 IEEE Conference on Robotics, Automation and Mechatronics 2006 Jun 1 (pp. 1-6). IEEE.
- Poorhosseini M, Nebel W, Gruttner K. A compiler comparison in the risc-v ecosystem. In2020 International Conference on Omni-layer Intelligent Systems (COINS) 2020 Aug 31 (pp. 1-6). IEEE.
- Gomez-Sanchez G, Call A, Teruel X, Alonso L, Moran I, Perez MA , Torrents D, Berral JL. Challenges and Opportunities for RISC-V Architectures Towards Genomics-Based Workloads. InInternational Conference on High Performance Computing 2023 May 21 (pp. 458-471). Cham: Springer Nature Switzerland.
- Zhou J, Du Y, Shen Z, Ma L, Criswell J, Walls RJ. Silhouette: Efficient protected shadow stacks for embedded systems. In29th USENIX Security Symposium (USENIX Security 20) 2020 (pp. 1219-1236).
- Prandini M, Ramilli M. Return-oriented programming. IEEE Security & Privacy. 2012 Dec 10;10(6):84-7. https://doi.org/10.1109/MSP.2012.152
- Burow N, Zhang X, Payer M. SoK: Shining light on shadow stacks. In2019 IEEE Symposium on Security and Privacy (SP) 2019 May 19 (pp. 985-999). IEEE.
- Zou C, Gao Y, Xue J. Practical software-based shadow stacks on x86-64. ACM Transactions on Architecture and Code Optimization (TACO). 2022 Oct 7;19(4):1-26. https://doi.org/10.1145/3556977
- Li J, Chen L, Xu Q, Tian L, Shi G, Chen K, Meng D. Zipper stack: Shadow stacks without shadow. InEuropean Symposium on Research in Computer Security 2020 Sep 12 (pp. 338-358). Cham: Springer International Publishing.
- Choi W, Seo M, Lee S, Kang BB. SuM: Efficient shadow stack protection on ARM Cortex-M. Computers & Security. 2024 Jan 1;136:103568.