Control-Flow Integrity (CFI) is an effective approach to mitigat-ing control-flow hijacking attacks. Conventional CFI techniques statically extract a control-flow graph (CFG) from a program and instrument the program to enforce that CFG. The statically gener-ated CFG includes all edges for all possible inputs; however, for a concrete input, the CFG may include many unnecessary edges. We present Per-Input Control-Flow Integrity (PICFI or piCFI), which is a new CFI technique that can enforce a CFG computed for each concrete input. piCFI starts executing a program with the empty CFG and lets the program itself lazily add edges to the enforced CFG if such edges are required for the concrete input. The edge addition is performed by piCFI-inserte...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Current Control-Flow Integrity (CFI) implementations track control edges individually, insensitive t...
As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determined attacke...
© Springer International Publishing AG, part of Springer Nature 2018. Through memory vulnerabilities...
© 2018 Authors. Per-Input Control Flow Integrity (PICFI) represents a recent advance in dynamic CFI ...
Control-Flow Integrity (CFI) is a software-hardening technique. It inlines checks into a program so ...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Control flow integrity (CFI) has been proposed as an approach to defend against control-hijacking me...
Constraining dynamic control transfers is a common tech-nique for mitigating software vulnerabilitie...
A popular software attack on a program is by transferring the program control to malicious code inse...
Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking atta...
Abstract—Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijac...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Abstract Constraining dynamic control transfers is a common technique for mitigating software vulner...
Abstract. Applications written in low-level languages without type or memory safety are prone to mem...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Current Control-Flow Integrity (CFI) implementations track control edges individually, insensitive t...
As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determined attacke...
© Springer International Publishing AG, part of Springer Nature 2018. Through memory vulnerabilities...
© 2018 Authors. Per-Input Control Flow Integrity (PICFI) represents a recent advance in dynamic CFI ...
Control-Flow Integrity (CFI) is a software-hardening technique. It inlines checks into a program so ...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Control flow integrity (CFI) has been proposed as an approach to defend against control-hijacking me...
Constraining dynamic control transfers is a common tech-nique for mitigating software vulnerabilitie...
A popular software attack on a program is by transferring the program control to malicious code inse...
Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking atta...
Abstract—Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijac...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Abstract Constraining dynamic control transfers is a common technique for mitigating software vulner...
Abstract. Applications written in low-level languages without type or memory safety are prone to mem...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Current Control-Flow Integrity (CFI) implementations track control edges individually, insensitive t...
As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determined attacke...