Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology
Code Reuse Attacks (CRA) represent a type of control flow hijacking that attackers exploit to manipulate the standard program execution path, resulting in abnormal processor behaviors. In response to the security concern, proposals for Control Flow Integrity (CFI) verification have emerged. The CFI...
| Published in: | IEEE Access |
|---|---|
| Main Authors: | , , , |
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2023-01-01
|
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10328880/ |
