Applications written in low-level languages without type or memory safety are especially prone to memory corruption. Attackers gain code execution capabilities through such ap-plications despite all currently deployed defenses by exploit-ing memory corruption vulnerabilities. Control-Flow In-tegrity (CFI) is a promising defense mechanism that restricts open control-flow transfers to a static set of well-known lo-cations. We present Lockdown, an approach to dynamic CFI that protects legacy, binary-only executables and libraries. Lock-down adaptively learns the control-flow graph of a running process using information from a trusted dynamic loader. The sandbox component of Lockdown restricts interactions between different shared objects to im...
Control flow integrity (CFI) has been proposed as an approach to defend against control-hijacking me...
Abstract Constraining dynamic control transfers is a common technique for mitigating software vulner...
Abstract—A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is ...
Applications written in low-level languages without type or memory safety are especially prone to me...
Abstract. Applications written in low-level languages without type or memory safety are prone to mem...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determined attacke...
Abstract—As existing defenses like ALSR, DEP, and stack cookies are not sufficient to stop determine...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Constraining dynamic control transfers is a common tech-nique for mitigating software vulnerabilitie...
© Springer International Publishing AG, part of Springer Nature 2018. Through memory vulnerabilities...
System programming languages such as C and C++ are ubiquitously used for systems software such as br...
Control-flow integrity (CFI) is a general defense against code-reuse exploits that currently constit...
Control flow integrity (CFI) has been proposed as an approach to defend against control-hijacking me...
Abstract Constraining dynamic control transfers is a common technique for mitigating software vulner...
Abstract—A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is ...
Applications written in low-level languages without type or memory safety are especially prone to me...
Abstract. Applications written in low-level languages without type or memory safety are prone to mem...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determined attacke...
Abstract—As existing defenses like ALSR, DEP, and stack cookies are not sufficient to stop determine...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Constraining dynamic control transfers is a common tech-nique for mitigating software vulnerabilitie...
© Springer International Publishing AG, part of Springer Nature 2018. Through memory vulnerabilities...
System programming languages such as C and C++ are ubiquitously used for systems software such as br...
Control-flow integrity (CFI) is a general defense against code-reuse exploits that currently constit...
Control flow integrity (CFI) has been proposed as an approach to defend against control-hijacking me...
Abstract Constraining dynamic control transfers is a common technique for mitigating software vulner...
Abstract—A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is ...