• Published 2017

Practical Challenges of Type Checking in Control Flow Integrity

@inproceedings{Mirzazade2017PracticalCO,
  title={Practical Challenges of Type Checking in Control Flow Integrity},
  author={Reza Mirzazade and Sajjad Arshad},
  year={2017}
}
Lack of memory management in unsafe programming languages such as C/C++ has been introducing significant threats to the applications. As a result, there has been a continuous arms race between the development of attacks and countermeasures. Generally speaking, memory corruption attacks are categorized into two types; code injection and code reuse. The most prevalent and practical defense mechanisms against these attacks are non-executable memory (W ⊕ X) and Address Space Layout Randomization… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-5 OF 5 REFERENCES

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level

VIEW 1 EXCERPT

Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM

VIEW 1 EXCERPT

On the effectiveness of address-space randomization.

  • Shacham, Hovav
  • Proceedings of the 11th ACM conference on Computer and communications security. ACM,
  • 2004
VIEW 1 EXCERPT