Projects per year
Abstract
Memory safety errors enable an adversary to corrupt code pointers, diverting the program’s control flow. Recent CPU features, such as Intel CET/IBT, harden software systems against exploitation attempts that maliciously redirect control flow operations. While IBT limits valid indirect branch targets, forward-edge transfers can still be redirected to any IBT-marked function. Thus, IBT cannot provide fine-grained protection against forward-edge control-flow attacks.
This paper presents code encryption with Intel TME-MK, a novel approach for control-flow enforcement against software exploitation on off-the-shelf x86 machines. We repurpose the Intel TME-MK runtime encryption to achieve function-level code encryption. Encrypted functions are only accessible through function pointers associated with the correct key, thereby enforcing fine-grained restrictions for control-flow transfers. We demonstrate two new encryption-based techniques for software hardening in practice: forward-edge control-flow integrity and library encryption. We implement a security-hardened toolchain that combines compiler instrumentation and a loader extension to ensure the validity of the program’s execution flow through efficient hardware-backed encryption. Our prototype shows a geomean performance overhead of 7.8 % for forward-edge control-flow integrity and 2.2 % for library encryption evaluated with the SPEC CPU2017 benchmark suite.
This paper presents code encryption with Intel TME-MK, a novel approach for control-flow enforcement against software exploitation on off-the-shelf x86 machines. We repurpose the Intel TME-MK runtime encryption to achieve function-level code encryption. Encrypted functions are only accessible through function pointers associated with the correct key, thereby enforcing fine-grained restrictions for control-flow transfers. We demonstrate two new encryption-based techniques for software hardening in practice: forward-edge control-flow integrity and library encryption. We implement a security-hardened toolchain that combines compiler instrumentation and a loader extension to ensure the validity of the program’s execution flow through efficient hardware-backed encryption. Our prototype shows a geomean performance overhead of 7.8 % for forward-edge control-flow integrity and 2.2 % for library encryption evaluated with the SPEC CPU2017 benchmark suite.
| Original language | English |
|---|---|
| Title of host publication | Computer Security - ESORICS 2025 - 30th European Symposium on Research in Computer Security, 2025, Proceedings |
| Editors | Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya |
| Publisher | Springer |
| Pages | 359-378 |
| Number of pages | 20 |
| ISBN (Print) | 9783032078902 |
| DOIs | |
| Publication status | Published - 2025 |
| Event | 30th European Symposium on Research in Computer Security, ESORICS 2025 - Toulouse, France Duration: 22 Sept 2025 → 24 Sept 2025 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Volume | 16054 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 30th European Symposium on Research in Computer Security, ESORICS 2025 |
|---|---|
| Abbreviated title | ESORICS 25 |
| Country/Territory | France |
| City | Toulouse |
| Period | 22/09/25 → 24/09/25 |
Keywords
- Code Encryption
- Control-Flow Integrity
- Intel TME-MK
- Intel TME-MK
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science
Fields of Expertise
- Information, Communication & Computing
Fingerprint
Dive into the research topics of 'Code Encryption with Intel TME-MK for Control-Flow Enforcement'. Together they form a unique fingerprint.-
RESIST - Enabling Secure RISC-V Architectures Through Efficient Software Integrity and Isolation Technologies
Mangard, S. (Project manager on research unit) & Mangard, S. (Consortium manager resp. coordinator with external organisations)
1/01/25 → 31/12/27
Project: Research project
-
AWARE - Hardware-Ensured Software Security
Mangard, S. (Consortium manager resp. coordinator with external organisations) & Mangard, S. (Project manager on research unit)
1/05/22 → 30/04/25
Project: Research project
Activities
- 1 Talk at conference or symposium
-
Code Encryption with Intel TME-MK for Control-Flow Enforcement
Unterguggenberger, M. (Speaker)
22 Sept 2025Activity: Talk or presentation › Talk at conference or symposium › Science to science