Feel me flow: A review of control-flow integrity methods for user and kernel space

0Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Attackers have evolved classic code-injection attacks, such as those caused by buffer overflows to sophisticated Turing-complete code-reuse attacks. Control-Flow Integrity (CFI) is a defence mechanism to eliminate control-flow hijacking attacks caused by common memory errors. CFI relies on static analysis for the creation of a program’s control-flow graph (CFG), then at runtime CFI ensures that the program follows the legitimate path. Thereby, when an attacker tries to execute malicious shellcode, CFI detects an unintended path and aborts execution. CFI heavily relies on static analysis for the accurate generation of the control-flow graph, and its security depends on how strictly the CFG is generated and enforced. This paper reviews the CFI schemes proposed over the last ten years and assesses their security guarantees against advanced exploitation techniques.

Cite

CITATION STYLE

APA

Díez-Franco, I., & Santos, I. (2017). Feel me flow: A review of control-flow integrity methods for user and kernel space. In Advances in Intelligent Systems and Computing (Vol. 527, pp. 477–486). Springer Verlag. https://doi.org/10.1007/978-3-319-47364-2_46

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free