Acknowledgement
이 과제는 부산대학교 기본연구지원사업(2년) 의하여 연구되었음.
References
- Y. Lee et al., "An agile approach to building RISC-V microprocessors," IEEE Micro, Vol.36, No.2, pp.8-20, 2016.
- A. Dorflinger et al., "A comparative survey of open-source application-class RISC-V processor implementations," In Proceedings of the 18th ACM International Conference on Computing Frontiers, pp.12-20, 2021.
- T. Chen and D. A. Patterson, "Risc-v geneology," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2016-6, 2016.
- C. Rodrigues, I. Marques, S. Pinto, T. Gomes, and A. Tavares, "Towards a heterogeneous fault-tolerance architecture based on arm and RISC-V processors," InIECON 2019-45th Annual Conference of the IEEE Industrial Electronics Society, IEEE, Vol.1, pp.3112-3117, 2019.
- D. Kanter, "RISC-V offers simple, modular ISA," Microprocessor Report, Vol.1, pp.1-5, 2016.
- William Li, Dale Gai, "RISC-V to Shake up $8.6-Billion $8.6-Billion Semiconductor IP Market," September 13, 2021 [online] https://www.counterpointresearch.com/insights/riscv-semiconductor-ip-market-2025/
- J. Jung, B. Kim, J. Cho, and B. Lee, "A secure platform model based on ARM platform security architecture for IoT devices," IEEE Internet of Things Journal, Vol.9, No.7, pp.5548-60, 2021
- M, Huang and C. Song, "ARMPatch: A binary patching framework for ARM-based IoT devices," Journal of Web Engineering, Vol.20, No.6, pp.1829-52, 2021.
- S. Yu, W. Chen, L. Li, and J. Qin, "Development of ARM-based embedded system for robot applications," In 2006 IEEE Conference on Robotics, Automation and Mechatronics, IEEE, pp.1-6, 2006.
- M, Poorhosseini, W, Nebel, and K. Gruttner, "A compiler comparison in the risc-v ecosystem, In 2020 International Conference on Omni-layer Intelligent Systems (COINS), IEEE, pp.1-6, 2020.
- G, Gomez-Sanchez et al., "Challenges and opportunities for RISC-V architectures towards genomics-based workloads," InInternational Conference on High Performance Computing, Cham: Springer Nature Switzerland, pp.458-471, 2023.
- J. Zhou, Y. Du, Z, Shen, L, Ma, J, Criswell, and R. J. Walls, "Silhouette: Efficient protected shadow stacks for embedded systems," In 29th USENIX Security Symposium (USENIX Security 20), pp.1219-1236, 2020.
- M, Prandini and M. Ramilli, "Return-oriented programming," IEEE Security & Privacy, Vol.10, No.6, pp.84-7, 2012.
- J. Li, L. Chen, Q. Xu, L. Tian, G. Shi, K. Chen, and D. Meng, "Zipper stack: Shadow stacks without shadow," In European Symposium on Research in Computer Security, Cham: Springer International Publishing, pp.338-358, 2020.
- C. Zou, Y. Gao, and J. Xue, "Practical software-based shadow stacks on x86-64," ACM Transactions on Architecture and Code Optimization, Vol.19, No.4, pp.1-26, 2022.
- N. Burow, X. Zhang, and M. Payer. "SoK: Shining light on shadow stacks," In Proceedings of IEEE Symposium on Security and Privacy (Oakland), 2019.
- N. M. Qui, C. H. Lin, and P. Chen, "Design and implementation of a 256-bit RISC-V-Based dynamically scheduled very long instruction word on FPGA," IEEE Access, Vol.8, pp.172996-173007, 2020.
- B. V. Patel, "A Technical Look at Intel's Control-Flow Enforcement Technology," 2020. [online] https://www.intel.com/content/www/us/en/developer/articles/technical/technical-look-control-flow-enforcement-technology.html?wapkw=control-flow%20enforcement%20technology
- M. Xie et al., "CETIS: Retrofitting Intel CET for generic and efficient intra-process memory isolation," in Proc. 29th ACM SIGSAC Conf. Comput. Commun. Secur. (CCS), pp.2989-3002, 2022, doi: 10.1145/3548606.3559344
- H. Kim, J. Lee, S. Kim, S. Jung, and S. K. Cha, "How'd security benefit reverse engineers? the implication of intel cet on function identification," In Proceedings of the International Conference on Dependable Systems Networks, pp.559-566, 2022.
- H. Liljestrand, T. Nyman, K. Wang, C. C. Perez, J. E. Ekberg, and N. Asokan, "PAC it up: Towards pointer integrity using ARM pointer authentication," In USENIX Security '19. USENIX Association.
- S. Yoo, J. Park, S. Kim, Y. Kim, and T. Kim, "In-kernel control-flow integrity on commodity oses using ARM pointer authentication," In 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, K. R. B. Butler and K. Thomas, Eds., USENIX Association, pp. 89-106, 2022.