Control-flow restrictor: compiler-based CFI for iOS

  title={Control-flow restrictor: compiler-based CFI for iOS},
  author={Jannik Pewny and Thorsten Holz},
Runtime attacks that exploit software vulnerabilities are still an important concern nowadays. Even smartphone operating systems such as Apple's iOS are affected by such attacks since the system is implemented in Objective-C, a programming language that enables attacks such as buffer overflows. As a generic protection technique against a whole class of attacks, control-flow integrity (CFI) offers some interesting properties. Recent work demonstrated that CFI can be implemented on iOS by… CONTINUE READING
Highly Cited
This paper has 75 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 38 extracted citations

Subversive-C: Abusing and Protecting Dynamic Message Dispatch

USENIX Annual Technical Conference • 2016
View 4 Excerpts
Highly Influenced

Modular control-flow integrity

PLDI • 2014
View 7 Excerpts
Highly Influenced

Mitigating Over-Permissible Transfer for Control Flow Integrity

2018 IEEE Conference on Dependable and Secure Computing (DSC) • 2018
View 2 Excerpts

SoK: Make JIT-Spray Great Again

WOOT @ USENIX Security Symposium • 2018
View 1 Excerpt

76 Citations

Citations per Year
Semantic Scholar estimates that this publication has 76 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-9 of 9 references

Preventing Memory Error Exploits with WIT

2008 IEEE Symposium on Security and Privacy (sp 2008) • 2008
View 8 Excerpts
Highly Influenced

Control-flow integrity

ACM Conference on Computer and Communications Security • 2005
View 7 Excerpts
Highly Influenced

On the effectiveness of address-space randomization

H. Shacham, E. jin Goh, N. Modadugu, B. Pfaff, D. Boneh
In ACM Conference on Computer and Communications Security (CCS), • 2004
View 5 Excerpts
Highly Influenced

Mathematical games - the fantastic combinations of john conwayś new solitaire game life, Oct

M. Gardner
View 3 Excerpts
Highly Influenced

Control Flow Integrity for COTS Binaries

USENIX Security Symposium • 2013
View 3 Excerpts
Highly Influenced