Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the forward edge, i.e., indirect calls through function pointers and virtual calls. Protecting the backward edge is left to stack canaries, which are easily bypassed through information leaks. Shadow Stacks are a fully precise mechanism for protecting backwards edges, and should be deployed with CFI mitigations.We present a comprehensive analysis of all possible shadow stack mechanisms along three axes: performance, compatibility, and security. For performance comparisons we use SPEC CPU2006, while security and compatibility are qualitatively analyzed. Based on our study, we renew calls for a...
Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the develop...
Abstract—Memory corruption bugs in software written in low-level languages like C or C++ are one of ...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Presented on September 21, 2018 at 12:00 p.m. in the Engineered Biosystems Building, Room 1005.Natha...
Protecting computing systems against cyberattacks should be put high on the agenda. For example, Col...
C, C++ and most other popular low-level languages delegate memory management to the programmer, freq...
Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of sys...
With the widespread deployment of Control-Flow Integrity (CFI), control-flow hijacking attacks, and ...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Control-Flow Integrity (CFI) is a defense which pre-vents control-flow hijacking attacks. While rece...
Manipulations of return addresses on the stack are the basis for a variety of attacks on programs wr...
Commodity operating systems such as Windows, Linux, and MacOS X form the Trusted Computing Base (TCB...
Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the develop...
Abstract—Memory corruption bugs in software written in low-level languages like C or C++ are one of ...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Presented on September 21, 2018 at 12:00 p.m. in the Engineered Biosystems Building, Room 1005.Natha...
Protecting computing systems against cyberattacks should be put high on the agenda. For example, Col...
C, C++ and most other popular low-level languages delegate memory management to the programmer, freq...
Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of sys...
With the widespread deployment of Control-Flow Integrity (CFI), control-flow hijacking attacks, and ...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Control-Flow Integrity (CFI) is a defense which pre-vents control-flow hijacking attacks. While rece...
Manipulations of return addresses on the stack are the basis for a variety of attacks on programs wr...
Commodity operating systems such as Windows, Linux, and MacOS X form the Trusted Computing Base (TCB...
Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the develop...
Abstract—Memory corruption bugs in software written in low-level languages like C or C++ are one of ...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...