书目名称 | Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity | 编辑 | Yan Lin | 视频video | | 概述 | Provides deep understanding of Control-Flow Integrity.Offers new insights on the relationship between function signature and compiler optimization.Demonstrates how CFI can be more efficient than Data | 丛书名称 | Information Security and Cryptography | 图书封面 |  | 描述 | There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually inserts checks before indirect branches to consult a read-only table which stores the valid CFG information. However, this kind of read-only table can be overwritten by some kinds of attacks (e.g., the Rowhammer attack and data-oriented programming). The third component is to efficiently enforce the CFI policy. In current approaches CFI checks are always executed whenever there is an indirect control flow transfer. Therefore, it is critical to minimize the performance impact of CFI checks..In this book, we propose novel solutions to handle these three fundamental components.To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and h | 出版日期 | Book 2021 | 关键词 | Control-Flow Integrity (CFI); Compiler Optimization; Dynamic Code Optimization; Information Security; Co | 版次 | 1 | doi | https://doi.org/10.1007/978-3-030-73141-0 | isbn_softcover | 978-3-030-73140-3 | isbn_ebook | 978-3-030-73141-0Series ISSN 1619-7100 Series E-ISSN 2197-845X | issn_series | 1619-7100 | copyright | The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl |
The information of publication is updating
书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity影响因子(影响力) 
书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity影响因子(影响力)学科排名 
书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity网络公开度 
书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity网络公开度学科排名 
书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity被引频次 
书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity被引频次学科排名 
书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity年度引用 
书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity年度引用学科排名 
书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity读者反馈 
书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity读者反馈学科排名 
|
|
|