{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:44:13Z","timestamp":1740102253101,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","funder":[{"name":"Shenzhen Science and Technology Program","award":["No. SGDX20201103095408029 and No. ZDSYS20210623092007023"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.62002151 and No. 62102175"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607246","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"595-608","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7082-0459","authenticated-orcid":false,"given":"Yu","family":"Wang","sequence":"first","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6871-5174","authenticated-orcid":false,"given":"Jinting","family":"Wu","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0461-1572","authenticated-orcid":false,"given":"Haodong","family":"Zheng","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7763-1079","authenticated-orcid":false,"given":"Zhenyu","family":"Ning","sequence":"additional","affiliation":[{"name":"Hunan University, China and Southern University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9841-3513","authenticated-orcid":false,"given":"Boyuan","family":"He","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3365-2526","authenticated-orcid":false,"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Accessed: 2021. Riscv-coremark. Available: https:\/\/github.com\/riscv-boom\/riscv-coremark."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_1_3_1","volume-title":"The rocket chip generator. EECS Department","author":"Asanovic Krste","year":"2016","unstructured":"Krste Asanovic, Rimas Avizienis, Jonathan Bachrach, Scott Beamer, David Biancolin, Christopher Celio, Henry Cook, Daniel Dabbelt, John Hauser, Adam Izraelevitz, 2016. The rocket chip generator. EECS Department, University of California, Berkeley, Tech. Rep. UCB\/EECS-2016-17 4 (2016)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053004"},{"volume-title":"transparent, and comprehensive runtime code manipulation. Ph.\u00a0D. Dissertation","author":"Bruening Derek","key":"e_1_3_2_1_6_1","unstructured":"Derek Bruening and Saman Amarasinghe. 2004. Efficient, transparent, and comprehensive runtime code manipulation. Ph.\u00a0D. Dissertation. Massachusetts Institute of Technology, Department of Electrical Engineering\u00a0\u2026."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315286"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_10_1","volume-title":"FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor","author":"Chen Kejun","year":"2022","unstructured":"Kejun Chen, Orlando Arias, Qingxu Deng, Daniela Oliveira, Xiaolong Guo, and Yier Jin. 2022. FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor. IEEE Transactions on Information Forensics and Security (TIFS\u201922) 17 (2022), 559\u2013573."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243823"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394608.1382153"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security\u201921)","author":"Chen Sanchuan","year":"2021","unstructured":"Sanchuan Chen, Zhiqiang Lin, and Yinqian Zhang. 2021. SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting. In Proceedings of the 30th USENIX Security Symposium (USENIX Security\u201921). 1665\u20131682."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.36"},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Security Symposium (USENIX Security\u201905)","author":"Chen Shuo","year":"2005","unstructured":"Shuo Chen, Jun Xu, Emre\u00a0Can Sezer, Prachi Gauriar, and Ravishankar\u00a0K Iyer. 2005. Non-Control-Data Attacks Are Realistic Threats.. In USENIX Security Symposium (USENIX Security\u201905), Vol.\u00a05. 146."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00052"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273440.1250722"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u201919)","author":"Davanian Ali","year":"2019","unstructured":"Ali Davanian, Zhenxiao Qi, Yu Qu, and Heng Yin. 2019. DECAF++: Elastic whole-system dynamic taint analysis. In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u201919). 31\u201345."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920)","author":"Delshadtehrani Leila","year":"2020","unstructured":"Leila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, and Manuel Egele. 2020. PHMon: A Programmable Hardware Monitor and Its Security Use Cases. In Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920). 807\u2013824."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.17"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263925"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384764"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181797"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_27_1","volume-title":"Implementing an application-specific instruction-set processor for system-level dynamic program analysis engines. ACM Transactions on Design Automation of Electronic Systems (TODAES\u201915) 20, 4","author":"Heo Ingoo","year":"2015","unstructured":"Ingoo Heo, Minsu Kim, Yongje Lee, Changho Choi, Jinyong Lee, Brent\u00a0Byunghoon Kang, and Yunheung Paek. 2015. Implementing an application-specific instruction-set processor for system-level dynamic program analysis engines. ACM Transactions on Design Automation of Electronic Systems (TODAES\u201915) 20, 4 (2015), 1\u201332."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915)","author":"Huang Jianjun","year":"2015","unstructured":"Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang. 2015. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915). 977\u2013992."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.29"},{"key":"e_1_3_2_1_30_1","unstructured":"Min\u00a0Gyung Kang Stephen McCamant Pongsin Poosankam and Dawn Song. 2011. Dta++: dynamic taint analysis with targeted control-flow propagation.. In Network and Distributed System Security (NDSS\u201911)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270347"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"e_1_3_2_1_33_1","volume-title":"Efficient security monitoring with the core debug interface in an embedded processor. ACM Transactions on Design Automation of Electronic Systems (TODAES\u201916) 22, 1","author":"Lee Jinyong","year":"2016","unstructured":"Jinyong Lee, Ingoo Heo, Yongje Lee, and Yunheung Paek. 2016. Efficient security monitoring with the core debug interface in an embedded processor. ACM Transactions on Design Automation of Electronic Systems (TODAES\u201916) 22, 1 (2016), 1\u201329."},{"key":"e_1_3_2_1_34_1","unstructured":"Kyu\u00a0Hyung Lee Xiangyu Zhang and Dongyan Xu. 2013. High Accuracy Attack Provenance via Binary-based Execution Partition.. In Network and Distributed System Security (NDSS\u201913) Vol.\u00a02. 4."},{"key":"e_1_3_2_1_35_1","unstructured":"Zhiqiang Lin Xuxian Jiang Dongyan Xu and Xiangyu Zhang. 2008. Automatic protocol format reverse engineering through context-aware monitored execution.. In Network and Distributed System Security (NDSS\u201908) Vol.\u00a08. Citeseer 1\u201315."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.26"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2644805"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065034"},{"key":"e_1_3_2_1_40_1","unstructured":"Uwe\u00a0F Mayer. 2003. Linux\/unix nbench."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2457411"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915)","author":"Ming Jiang","year":"2015","unstructured":"Jiang Ming, Dinghao Wu, Gaoyao Xiao, Jun Wang, and Peng Liu. 2015. Taintpipe: Pipelined symbolic taint analysis. In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915). 65\u201380."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the Workshop on Interaction Between Compilers and Computer Architectures.","author":"Nagarajan Vijay","year":"2008","unstructured":"Vijay Nagarajan, Ho-Seop Kim, Youfeng Wu, and Rajiv Gupta. 2008. Dynamic information flow tracking on multicores. In Proceedings of the Workshop on Interaction Between Compilers and Computer Architectures."},{"key":"e_1_3_2_1_44_1","unstructured":"James Newsome and Dawn\u00a0Xiaodong Song. 2005. Dynamic Taint Analysis for Automatic Detection Analysis and SignatureGeneration of Exploits on Commodity Software.. In Network and Distributed System Security (NDSS\u201905) Vol.\u00a05. Citeseer 3\u20134."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24159"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016604.2016650"},{"volume-title":"Design and implementation of a dynamic information flow tracking architecture to secure a RISC-V core for IoT applications. In 2018 IEEE High Performance extreme Computing Conference (HPEC\u201918)","author":"Palmiero Christian","key":"e_1_3_2_1_47_1","unstructured":"Christian Palmiero, Giuseppe Di\u00a0Guglielmo, Luciano Lavagno, and Luca\u00a0P Carloni. 2018. Design and implementation of a dynamic information flow tracking architecture to secure a RISC-V core for IoT applications. In 2018 IEEE High Performance extreme Computing Conference (HPEC\u201918). IEEE, 1\u20137."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CODES-ISSS.2013.6658991"},{"key":"e_1_3_2_1_49_1","unstructured":"Zhenxiao Qi Qian Feng Yueqiang Cheng Mengjia Yan Peng Li Heng Yin and Tao Wei. 2021. SpecTaint: Speculative taint analysis for discovering spectre gadgets. In Network and Distributed System Security (NDSS\u201921)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378533.1378538"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1037187.1024404"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484788"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2008.4658637"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.134"},{"key":"e_1_3_2_1_55_1","unstructured":"Muhammad\u00a0Abdul Wahab. 2018. Hardware support for the security analysis of embedded softwares: applications on information flow control and malware analysis. Ph.\u00a0D. Dissertation. CentraleSup\u00e9lec."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/RECONFIG.2018.8641695"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.23919\/FPL.2017.8056767"},{"key":"e_1_3_2_1_58_1","volume-title":"I: User-Level ISA, Document Version 20191213","author":"Waterman Editors\u00a0Andrew","year":"2019","unstructured":"Editors\u00a0Andrew Waterman and Krste Asanovi\u0107. December 2019. The RISC-V Instruction Set Manual, Volume I: User-Level ISA, Document Version 20191213. RISC-V Foundation."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0107216"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00040"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1945023.1945039"}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:29:21Z","timestamp":1729074561000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":61,"alternative-id":["10.1145\/3607199.3607246","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607246","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}