Control Jujutsu
Control flow integrity (CFI) has been proposed as an approach to defend against control-hijacking memory corruption attacks. CFI works by assigning tags to indirect branch targets statically and checking them at runtime. Coarse-grained enforcements of CFI that use a small number of tags to improve t...
Main Authors: | Evans, Isaac (Contributor), Long, Fan (Contributor), Otgonbaatar, Ulziibayar (Contributor), Shrobe, Howard E (Contributor), Rinard, Martin C (Contributor), Okhravi, Hamed (Contributor), Sidiroglou-Douskos, Stelios (Contributor) |
---|---|
Other Authors: | Lincoln Laboratory (Contributor), Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory (Contributor), Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor) |
Format: | Article |
Language: | English |
Published: |
Association for Computing Machinery,
2018-02-22T21:23:24Z.
|
Subjects: | |
Online Access: | Get fulltext |
Similar Items
-
Automatic runtime error repair and containment via recovery shepherding
by: Long, Fan, et al.
Published: (2020) -
Missing the Point(er): On the Effectiveness of Code Pointer Integrity
by: Evans, Isaac, et al.
Published: (2020) -
Sound input filter generation for integer overflow errors
by: Long, Fan, et al.
Published: (2014) -
CodeCarbonCopy
by: Sidiroglou-Douskos, Stelios, et al.
Published: (2021) -
Program fracture and recombination for efficient automatic code reuse
by: Amidon, Peter, et al.
Published: (2020)