找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity; Yan Lin Book 2021 The Editor(s) (if applicab

[复制链接]
查看: 39980|回复: 37
发表于 2025-3-21 19:33:35 | 显示全部楼层 |阅读模式
书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
编辑Yan Lin
视频video
概述Provides deep understanding of Control-Flow Integrity.Offers new insights on the relationship between function signature and compiler optimization.Demonstrates how CFI can be more efficient than Data
丛书名称Information Security and Cryptography
图书封面Titlebook: Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity;  Yan Lin Book 2021 The Editor(s) (if applicab
描述There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually inserts checks before indirect branches to consult a read-only table which stores the valid CFG information. However, this kind of read-only table can be overwritten by some kinds of attacks (e.g., the Rowhammer attack and data-oriented programming). The third component is to efficiently enforce the CFI policy. In current approaches CFI checks are always executed whenever there is an indirect control flow transfer. Therefore, it is critical to minimize the performance impact of CFI  checks..In this book, we propose novel solutions to handle these three fundamental components.To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and h
出版日期Book 2021
关键词Control-Flow Integrity (CFI); Compiler Optimization; Dynamic Code Optimization; Information Security; Co
版次1
doihttps://doi.org/10.1007/978-3-030-73141-0
isbn_softcover978-3-030-73140-3
isbn_ebook978-3-030-73141-0Series ISSN 1619-7100 Series E-ISSN 2197-845X
issn_series 1619-7100
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
The information of publication is updating

书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity影响因子(影响力)




书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity影响因子(影响力)学科排名




书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity网络公开度




书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity网络公开度学科排名




书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity被引频次




书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity被引频次学科排名




书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity年度引用




书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity年度引用学科排名




书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity读者反馈




书目名称Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:31:05 | 显示全部楼层
1619-7100 zation.Demonstrates how CFI can be more efficient than Data There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG gene
发表于 2025-3-22 04:20:43 | 显示全部楼层
Introduction,In this chapter, we first introduce concepts and implementations of Control-Flow Integrity [.], which is a fundamental approach to mitigating control-flow hijacking attacks, and then present practical issues of previous CFI systems and summarize how we address those problems.
发表于 2025-3-22 05:05:28 | 显示全部楼层
发表于 2025-3-22 10:34:00 | 显示全部楼层
When Function Signature Recovery Meets Compiler Optimization,Control-Flow Integrity (CFI) [.] is a promising technique in defending against control-flow hijacking attacks [.,.,.,.] by enforcing that runtime control flows follow valid paths in the program’s Control-Flow Graph (CFG).
发表于 2025-3-22 16:10:24 | 显示全部楼层
发表于 2025-3-22 19:27:39 | 显示全部楼层
发表于 2025-3-22 22:10:57 | 显示全部楼层
Conclusions,This book makes contributions in recovering, embedding, and enforcing control-flow integrity policies.
发表于 2025-3-23 02:46:48 | 显示全部楼层
Information Security and Cryptographyhttp://image.papertrans.cn/n/image/668460.jpg
发表于 2025-3-23 07:57:51 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-28 08:07
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表