Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
ACM Conference on Computer and Communications Security, pp. 952-963, 2015.
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain arbitrary code execution. One promising mitigation, control-flow integrity (CFI), has been the subject of extensive research in the past decade. One of the core findings is that adversaries can construct Turing-complete code-reuse attacks aga...More
PPT (Upload PPT)