Code-Pointer Integrity

@inproceedings{Kuznetsov2014CodePointerI,
  title={Code-Pointer Integrity},
  author={Volodymyr Kuznetsov and Laszlo Szekeres and Mathias Payer and George Candea and R. Sekar and Dawn Xiaodong Song},
  booktitle={OSDI},
  year={2014}
}
  • Volodymyr Kuznetsov, Laszlo Szekeres, +3 authors Dawn Xiaodong Song
  • Published in OSDI 2014
  • Computer Science
  • Systems code is often written in low-level languages like C/C++, which offer many benefits but also delegate memory management to programmers. This invites memory safety bugs that attackers can exploit to divert control flow and compromise the system. Deployed defense mechanisms (e.g., ASLR, DEP) are incomplete, and stronger defense mechanisms (e.g., CFI) often have high overhead and limited guarantees [19, 15, 9]. We introduce code-pointer integrity (CPI), a new design point that guarantees… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 261 CITATIONS

    ConTExT: A Generic Approach for Mitigating Spectre

    VIEW 7 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    From threats to solutions in data center networks

    VIEW 7 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Binary Debloating for Security via Demand Driven Loading

    VIEW 6 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    ConTExT: Leakage-Free Transient Execution

    VIEW 7 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    HW-CDI: Hard-Wired Control Data Integrity

    VIEW 7 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Taking Control of SDN-based Cloud Systems via the Data Plane

    VIEW 17 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Techniques to Protect Confidentiality and Integrity of Persistent and In-Memory Data

    VIEW 16 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Stack Bounds Protection with Low Fat Pointers

    VIEW 6 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    LMP: light-weighted memory protection with hardware assistance

    VIEW 5 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    2014
    2020

    CITATION STATISTICS

    • 69 Highly Influenced Citations

    • Averaged 54 Citations per year from 2017 through 2019

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 18 REFERENCES

    Profile - guided automated software diversity

    • T. Holz.
    • IEEE / ACM Symp . on Code Generation and Optimization
    • 2013

    SoK: Eternal War in Memory

    Light - weight bounds checking

    • A. Homescu, S. Neisius, P. Larsen, S. Brunthaler
    • IEEE / ACM Symp . on Code Generation and Optimization
    • 2012

    Watchdog: Hardware for safe and secure manual memory management and full memory safety

    Comprehensive and Efficient Protection of Kernel Control Data