ผู้เขียน
Nick Christoulakis, George Christou, Elias Athanasopoulos, Sotiris Ioannidis
วันที่เผยแพร่
2016
การประชุม
6th ACM Conference on Data and Application Security and Privacy (CODASPY)
ผู้เผยแพร่
ACM
คำอธิบาย
Control-flow hijacking is the principal method for code-reuse techniques like Return-oriented Programming (ROP) and Jump-oriented Programming (JOP). For defending against such attacks, the community has proposed Control-flow Integrity (CFI), a technique capable of preventing exploitation by verifying that every (indirect) control-flow transfer points to a legitimate address. Enabling CFI in real systems is not straightforward, since in many cases the actual Control-flow Graph (CFG) of a program can be only approximated. Even in the case that there is perfect knowledge of the CFG, ensuring that all return instructions will return to their actual call sites, without employing a shadow stack, is questionable. On the other hand, the community has expressed concerns related to significant overheads stemming from enabling a shadow stack.
In this paper, we acknowledge the importance of a shadow stack for supporting …
การอ้างอิงทั้งหมด
2016201720182019202020212022202320244191322281818165
บทความทางวิชาการ
N Christoulakis, G Christou, E Athanasopoulos… - Proceedings of the Sixth ACM Conference on Data and …, 2016