Current Control-Flow Integrity (CFI) implementations track control edges individually, insensitive to the context of preceding edges. Recent work demonstrates that this leaves sufficient leeway for powerful ROP attacks. Context-sensitive CFI, which can provide enhanced security, is widely considered impractical for real-world adoption. Our work shows that Context-sensitive CFI (CCFI) for both the backward and forward edge can be implemented efficiently on commodity hardware. We present PathArmor, a binary-level CCFI implementation which tracks paths to sensitive program states, and defines the set of valid control edges within the state context to yield higher precision than existing CFI implementations. Even with simple context-sensitive p...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Abstract. Applications written in low-level languages without type or memory safety are prone to mem...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Current Control-Flow Integrity (CFI) implementations track control edges individually, insensitive t...
Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking atta...
Control-Flow Integrity (CFI) is an effective approach to mitigat-ing control-flow hijacking attacks....
Abstract—Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijac...
© Springer International Publishing AG, part of Springer Nature 2018. Through memory vulnerabilities...
Constraining dynamic control transfers is a common tech-nique for mitigating software vulnerabilitie...
Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CR...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
© 2018 Authors. Per-Input Control Flow Integrity (PICFI) represents a recent advance in dynamic CFI ...
Abstract Constraining dynamic control transfers is a common technique for mitigating software vulner...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
A popular software attack on a program is by transferring the program control to malicious code inse...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Abstract. Applications written in low-level languages without type or memory safety are prone to mem...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Current Control-Flow Integrity (CFI) implementations track control edges individually, insensitive t...
Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking atta...
Control-Flow Integrity (CFI) is an effective approach to mitigat-ing control-flow hijacking attacks....
Abstract—Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijac...
© Springer International Publishing AG, part of Springer Nature 2018. Through memory vulnerabilities...
Constraining dynamic control transfers is a common tech-nique for mitigating software vulnerabilitie...
Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CR...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
© 2018 Authors. Per-Input Control Flow Integrity (PICFI) represents a recent advance in dynamic CFI ...
Abstract Constraining dynamic control transfers is a common technique for mitigating software vulner...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
A popular software attack on a program is by transferring the program control to malicious code inse...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...
Abstract. Applications written in low-level languages without type or memory safety are prone to mem...
Current software attacks often build on exploits that subvert machine-code execution. The enforcemen...