Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology

Code Reuse Attacks (CRA) represent a type of control flow hijacking that attackers exploit to manipulate the standard program execution path, resulting in abnormal processor behaviors. In response to the security concern, proposals for Control Flow Integrity (CFI) verification have emerged. The CFI...

Full description

Bibliographic Details
Published in:IEEE Access
Main Authors: Senyang Li, Weike Wang, Wenxin Li, Dexue Zhang
Format: Article
Language:English
Published: IEEE 2023-01-01
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10328880/