User loginNavigation |
Control-Flow Integrity
Two papers about CFI.
Control-Flow Integrity - Principles, Implementations, and Applications:
Current software attacks often build on exploits that subvert machine- code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such attacks from arbitrarily controlling program behavior. CFI enforcement is simple, and its guarantees can be established formally, even with respect to powerful adversaries. Moreover, CFI enforcement is practical: it is compatible with existing software and can be done efficiently using software rewriting in commodity systems. Finally, CFI provides a useful foundation for enforcing further security policies, as we demonstrate with efficient software implementations of a protected shadow call stack and of access control for memory regions. A Theory of Secure Control-Flow:
Control-Flow Integrity (CFI) means that the execution of a program dynamically follows only certain paths, in accordance with a static policy. CFI can prevent attacks that, by exploiting buffer overflows and other vulnerabilities, attempt to control program behavior. This paper develops the basic theory that underlies two practical techniques for CFI enforcement, with precise formulations of hypotheses and guarantees. Not very language oriented, I am afraid. However, this is related to PCC and TAL which were discussed here in the past. |
Browse archives
Active forum topics
|
Recent comments
16 weeks 1 day ago
20 weeks 3 days ago
22 weeks 17 hours ago
22 weeks 17 hours ago
24 weeks 5 days ago
29 weeks 2 days ago
29 weeks 3 days ago
29 weeks 6 days ago
29 weeks 6 days ago
32 weeks 4 days ago