Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessThis International Fact-Checking Day, use these 5 tips to spot AI-generated contentFast Company TechRio Receipt Protocol – Cryptographic Proof for AI ActionsHacker News AI TopNew AI testing method flags fairness risks in autonomous systemsTechXplore AI[D] Make. Big. Batch. Size.Reddit r/MachineLearningNew open source AI self driving testingHacker News AI TopAgentic AI and the next intelligence explosionHacker News AI TopThe miracle of AI agent-assisted learningHacker News AI TopGoogle launches Gemma 4, its "most intelligent" open model family, purpose-built for advanced reasoning and agentic workflows, under an Apache 2.0 license (The Keyword)TechmemeA Differentiable Programming System to Bridge Machine Learning and ScientificComputingDev.to AIWhy Your AI Copilot Builds the Wrong Thing (And How to Fix It)Dev.to AIThe productivity paradox of AI coding assistantsHacker News AI TopBuilding Sentinel Gate: A 3-Layer Security Pipeline for AI AgentsDev.to AIBlack Hat USADark ReadingBlack Hat AsiaAI BusinessThis International Fact-Checking Day, use these 5 tips to spot AI-generated contentFast Company TechRio Receipt Protocol – Cryptographic Proof for AI ActionsHacker News AI TopNew AI testing method flags fairness risks in autonomous systemsTechXplore AI[D] Make. Big. Batch. Size.Reddit r/MachineLearningNew open source AI self driving testingHacker News AI TopAgentic AI and the next intelligence explosionHacker News AI TopThe miracle of AI agent-assisted learningHacker News AI TopGoogle launches Gemma 4, its "most intelligent" open model family, purpose-built for advanced reasoning and agentic workflows, under an Apache 2.0 license (The Keyword)TechmemeA Differentiable Programming System to Bridge Machine Learning and ScientificComputingDev.to AIWhy Your AI Copilot Builds the Wrong Thing (And How to Fix It)Dev.to AIThe productivity paradox of AI coding assistantsHacker News AI TopBuilding Sentinel Gate: A 3-Layer Security Pipeline for AI AgentsDev.to AI
AI NEWS HUBbyEIGENVECTOREigenvector

HPCCFA: Leveraging Hardware Performance Counters for Control Flow Attestation

arXiv cs.CRby Claudius Pott, Luca Wilke, Jan Wichelmann, Thomas EisenbarthApril 1, 20261 min read0 views
Source Quiz

arXiv:2603.29749v1 Announce Type: new Abstract: Trusted Execution Environments (TEEs) allow the secure execution of code on remote systems without the need to trust their operators. They use static attestation as a central mechanism for establishing trust, allowing remote parties to verify that their code is executed unmodified in an isolated environment. However, this form of attestation does not cover runtime attacks, where an attacker exploits vulnerabilities in the software inside the TEE. Control Flow Attestation (CFA), a form of runtime attestation, is designed to detect such attacks. In this work, we present a method to extend TEEs with CFA and discuss how it can prevent exploitation in the event of detected control flow violations. Furthermore, we introduce HPCCFA, a mechanism that

View PDF HTML (experimental)

Abstract:Trusted Execution Environments (TEEs) allow the secure execution of code on remote systems without the need to trust their operators. They use static attestation as a central mechanism for establishing trust, allowing remote parties to verify that their code is executed unmodified in an isolated environment. However, this form of attestation does not cover runtime attacks, where an attacker exploits vulnerabilities in the software inside the TEE. Control Flow Attestation (CFA), a form of runtime attestation, is designed to detect such attacks. In this work, we present a method to extend TEEs with CFA and discuss how it can prevent exploitation in the event of detected control flow violations. Furthermore, we introduce HPCCFA, a mechanism that uses HPCs for CFA purposes, enabling hardware-backed trace generation on commodity CPUs. We demonstrate the feasibility of HPCCFA on a proof-of-concept implementation for Keystone on RISC-V. Our evaluation investigates the interplay of the number of measurement points and runtime protection, and reveals a trade-off between detection reliability and performance overhead.

Subjects:

Cryptography and Security (cs.CR)

Cite as: arXiv:2603.29749 [cs.CR]

(or arXiv:2603.29749v1 [cs.CR] for this version)

https://doi.org/10.48550/arXiv.2603.29749

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Claudius Pott [view email] [v1] Tue, 31 Mar 2026 13:51:30 UTC (439 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

announcevaluationarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
HPCCFA: Lev…announcevaluationarxivarXiv cs.CR

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 163 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Releases