Variable Record Table: A Unified Hardware-Assisted Framework for Runtime Security

📅 2025-12-14
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Modern computing systems face heterogeneous security threats—including memory corruption, speculative execution vulnerabilities, and control-flow hijacking—yet existing defenses are typically isolated, suffering from high performance overhead and incomplete coverage. This paper proposes the Variable Record Table (VRT), a hardware-assisted unified runtime security framework that, for the first time, jointly enforces spatial memory safety, backward control-flow integrity (CFI), and speculative execution attack detection within a single lightweight hardware structure. VRT employs dynamic instruction instrumentation to extract address, bounds metadata, and control-flow signatures, constructing a real-time-updated protection table; a custom hardware unit enables near-zero-instruction-overhead, low-latency detection. Evaluated on MiBench and SPEC benchmarks, VRT achieves 100% attack detection rate with less than 25 KB of storage (512 entries), incurring only 8% area overhead and 11.65 μW power consumption.

Technology Category

Application Category

📝 Abstract
Modern computing systems face security threats, including memory corruption attacks, speculative execution vul- nerabilities, and control-flow hijacking. Although existing solu- tions address these threats individually, they frequently introduce performance overhead and leave security gaps. This paper presents a Variable Record Table (VRT) with a unified hardware- assisted framework that simultaneously enforces spatial memory safety against buffer overflows, back-edge control-flow integrity (CFI), and speculative execution attack detection. The VRT dynamically constructs a protection table by instrumenting run- time instructions to extract memory addresses, bounds metadata, and control-flow signatures. Our evaluation across MiBench and SPEC benchmarks shows that VRT successfully detects all attack variants tested with zero additional instruction overhead. Fur- thermore, it maintains memory requirements below 25KB (for 512 entries) and maintains area / power overhead under 8% and 11.65 μW, respectively. By consolidating three essential security mechanisms into a single hardware structure, VRT provides comprehensive protection while minimizing performance impact.
Problem

Research questions and friction points this paper is trying to address.

Addresses memory corruption, speculative execution, and control-flow attacks
Unifies hardware-assisted security mechanisms to reduce performance overhead
Detects attacks with zero instruction overhead and minimal resource usage
Innovation

Methods, ideas, or system contributions that make the work stand out.

Unified hardware-assisted framework for runtime security
Dynamic protection table construction via instruction instrumentation
Consolidates three security mechanisms with minimal overhead
🔎 Similar Papers
No similar papers found.
S
Suraj Kumar Sah
Department of Computer Science and Engineering, Kathmandu University, Dhulikhel, Nepal
Love Kumar Sah
Love Kumar Sah
Assistant Professor @ Western New England University
Runtime Software SecurityHardware IP ProtectionHardware Security