Adversaries exploit memory corruption vulnerabilities to hi-jack a program’s control flow and gain arbitrary code ex-ecution. One promising mitigation, control-flow integrity (CFI), has been the subject of extensive research in the past decade. One of the core findings is that adversaries can con-struct Turing-complete code-reuse attacks against coarse-grained CFI policies because they admit control flows that are not part of the original program. This insight led the research community to focus on fine-grained CFI implemen-tations. In this paper we show how to exploit heap-based vul-nerabilities to control the stack contents including security-critical values used to validate control-flow transfers. Our investigation shows that although pr...
Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of sys...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Abstract—A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is ...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determined attacke...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Abstract—As existing defenses like ALSR, DEP, and stack cookies are not sufficient to stop determine...
Abstract—As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determine...
Abstract—As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determine...
Control-Flow Integrity (CFI) is a defense which pre-vents control-flow hijacking attacks. While rece...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of sys...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Abstract—A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is ...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determined attacke...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Abstract—As existing defenses like ALSR, DEP, and stack cookies are not sufficient to stop determine...
Abstract—As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determine...
Abstract—As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determine...
Control-Flow Integrity (CFI) is a defense which pre-vents control-flow hijacking attacks. While rece...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of sys...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Abstract—A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is ...