Back to Search
Start Over
Wrangling in the Power of Code Pointers with ProxyCFI
- Source :
- Data and Applications Security and Privacy XXXIII ISBN: 9783030224783, DBSec
- Publication Year :
- 2019
- Publisher :
- Springer International Publishing, 2019.
-
Abstract
- Despite being a more than 40-year-old dark art, control flow attacks remain a significant and attractive means of penetrating applications. Control Flow Integrity (CFI) prevents control flow attacks by forcing the execution path of a program to follow the control flow graph (CFG). This is performed by inserting checks before indirect jumps to ensure that the target is within a statically determined valid target set. However, recent advanced control flow attacks have been shown to undermine prior CFI techniques by swapping targets of an indirect jump with another one from the valid set.
Details
- ISBN :
- 978-3-030-22478-3
- ISBNs :
- 9783030224783
- Database :
- OpenAIRE
- Journal :
- Data and Applications Security and Privacy XXXIII ISBN: 9783030224783, DBSec
- Accession number :
- edsair.doi...........74bb773e8552bb03f6bf7802c705c20f
- Full Text :
- https://doi.org/10.1007/978-3-030-22479-0_17