Back to Search Start Over

Wrangling in the Power of Code Pointers with ProxyCFI

Authors :
Todd Austin
Misiker Tadesse Aga
Colton Holoday
Source :
Data and Applications Security and Privacy XXXIII ISBN: 9783030224783, DBSec
Publication Year :
2019
Publisher :
Springer International Publishing, 2019.

Abstract

Despite being a more than 40-year-old dark art, control flow attacks remain a significant and attractive means of penetrating applications. Control Flow Integrity (CFI) prevents control flow attacks by forcing the execution path of a program to follow the control flow graph (CFG). This is performed by inserting checks before indirect jumps to ensure that the target is within a statically determined valid target set. However, recent advanced control flow attacks have been shown to undermine prior CFI techniques by swapping targets of an indirect jump with another one from the valid set.

Details

ISBN :
978-3-030-22478-3
ISBNs :
9783030224783
Database :
OpenAIRE
Journal :
Data and Applications Security and Privacy XXXIII ISBN: 9783030224783, DBSec
Accession number :
edsair.doi...........74bb773e8552bb03f6bf7802c705c20f
Full Text :
https://doi.org/10.1007/978-3-030-22479-0_17