Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks

ACM Conference on Computer and Communications Security, pp. 952-963, 2015.

Cited by: 132|Bibtex|Views38|Links
EI

Abstract:

Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain arbitrary code execution. One promising mitigation, control-flow integrity (CFI), has been the subject of extensive research in the past decade. One of the core findings is that adversaries can construct Turing-complete code-reuse attacks aga...More

Code:

Data:

Your rating :
0

 

Tags
Comments