Sphinx: a secure architecture based on binary code diversification and execution obfuscation
Files
Published version
Date
2018
DOI
Authors
Kinsy, Michel A.
Kava, Donato
Ehret, Alan
Mark, Miguel
Version
Published version
OA Version
Citation
MA Kinsy, D Kava, A Ehret, M Mark. 2018. "Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation." Boston Area Architecture 2018 Workshop (BARC18)
Abstract
Sphinx, a hardware-software co-design architecture for binary code and runtime obfuscation. The Sphinx architecture uses binary code diversification and self-reconfigurable processing elements to maintain application functionality while obfuscating the binary code and architecture states to attackers. This approach dramatically reduces an attacker’s ability to exploit information gained from one deployment to attack another deployment. Our results show that the Sphinx is able to decouple the program’s execution time, power and memory and I/O activities from its functionality. It is also practical in the sense that the system (both software and hardware) overheads are minimal.