Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243797
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing Unique Code Target Property for Control-Flow Integrity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
58
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 86 publications
(66 citation statements)
references
References 41 publications
0
58
0
Order By: Relevance
“…HAFIX [17] is a hardware-assisted CFI scheme that confines function returns to active call sites. Contextsensitive CFI [18,24,45] further ensures that each control-flow transfer taken by the program is consistent with a non-malicious trace. This leads to a more expressive policy compared to stateless CFI, but context-sensitive CFI enforcement has been dismissed as impractical for real-world adoption [1].…”
Section: Related Workmentioning
confidence: 99%
“…HAFIX [17] is a hardware-assisted CFI scheme that confines function returns to active call sites. Contextsensitive CFI [18,24,45] further ensures that each control-flow transfer taken by the program is consistent with a non-malicious trace. This leads to a more expressive policy compared to stateless CFI, but context-sensitive CFI enforcement has been dismissed as impractical for real-world adoption [1].…”
Section: Related Workmentioning
confidence: 99%
“…This is in contrast to CFI mechanisms [23], where the security guarantees are reduced by over-approximating the valid target set. There is no known method to statically compute a fully precise target sets for CFI [23], while dynamic methods [60] require special hardware extensions that are not available on MCUS. Thus, an attacker can perform a control-flow bending style attack by over-writing the return address with a return target within the over-approximated target set and divert the control-flow [28], [61].…”
Section: Designmentioning
confidence: 99%
“…Various experiments demonstrated that call-preceded gadgets are able to bypass the CFI technique that limits itself to only control-flow transfer checks prior to unsafe function calls [47]. binCFI enhances strong compatibility; however, it fails to restrict all types of control-flow attacks [58].…”
Section: Cfi For Cots Binaries (Bincfi)mentioning
confidence: 99%
“…In addition to that, the springboard consumes a lot more memory [60]. Although CCFIR comprises better performance but unable to provide enough security to mitigate control-hijacking attacks [58].…”
Section: Practical Cfi and Randomization For Binary Executables (Ccfir)mentioning
confidence: 99%