Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, by ensuring that every (indirect) control-flow transfer points to a legitimate address and it is part of the Control-flow Graph (CFG) of a program. Enabling CFI in real systems is not straightforward, since in many cases the actual CFG of a program can only be approximated. Even in the case where there is perfect knowl- edge of the CFG, ensuring that all return instructions will return to their actual call sites, without employing a shadow stack, is questionable. In this work, we explore the implementation of a full-featured CFI- enabled Instruction Set Architecture (ISA) on actual hardware. Our new instructions provide the finest possible gr...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Control-Flow Integrity (CFI) is an effective approach to mitigat-ing control-flow hijacking attacks....
Programmable Logic Controllers (PLCs) are a family of embedded devices that are being used to contro...
Control-flow integrity (CFI) is a general defense against code-reuse exploits that currently constit...
A popular software attack on a program is by transferring the program control to malicious code inse...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
© Springer International Publishing AG, part of Springer Nature 2018. Through memory vulnerabilities...
Control-flow integrity (CFI) is considered as a general and promising method to prevent code-reuse a...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
<p>Embedded software today is pervasive: they can be found everywhere, from coffee makers and medica...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Control-Flow Integrity (CFI) is an effective approach to mitigat-ing control-flow hijacking attacks....
Programmable Logic Controllers (PLCs) are a family of embedded devices that are being used to contro...
Control-flow integrity (CFI) is a general defense against code-reuse exploits that currently constit...
A popular software attack on a program is by transferring the program control to malicious code inse...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
© Springer International Publishing AG, part of Springer Nature 2018. Through memory vulnerabilities...
Control-flow integrity (CFI) is considered as a general and promising method to prevent code-reuse a...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
<p>Embedded software today is pervasive: they can be found everywhere, from coffee makers and medica...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
Control-Flow Integrity (CFI) is an effective approach to mitigat-ing control-flow hijacking attacks....
Programmable Logic Controllers (PLCs) are a family of embedded devices that are being used to contro...