Control-flow integrity

Known as: CFI 
Control-flow integrity (CFI) is a general term for computer security techniques which prevent a wide variety of malware attacks from redirecting the… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2005-2017
0102020052017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Control-flow hijacking is the principal method for code-reuse techniques like Return-oriented Programming (ROP) and Jump-oriented… (More)
Is this relevant?
2015
2015
Control-Flow Integrity (CFI) is an effective approach to mitigating control-flow hijacking attacks. Conventional CFI techniques… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 10
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Control-Flow Integrity (CFI) is a software-hardening technique. It inlines checks into a program so that its execution always… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2014
Highly Cited
2014
As existing defenses like ASLR, DEP, and stack cookies are not sufficient to stop determined attackers from exploiting our… (More)
  • figure 1
  • figure 2
  • table II
  • figure 3
  • figure 4
Is this relevant?
2014
2014
Applications written in low-level languages without type or memory safety are especially prone to memory corruption. Attackers… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2014
Highly Cited
2014
We present a new system, KCoFI, that is the first we know of to provide complete Control-Flow Integrity protection for commodity… (More)
  • figure 1
  • table I
  • figure 2
  • table II
  • figure 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Control-Flow Integrity (CFI) has been recognized as an important low-level security property. Its enforcement can defeat most… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?