找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity; Yan Lin Book 2021 The Editor(s) (if applicab

[復(fù)制鏈接]
查看: 40036|回復(fù): 37
樓主
發(fā)表于 2025-3-21 19:33:35 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
編輯Yan Lin
視頻videohttp://file.papertrans.cn/669/668460/668460.mp4
概述Provides deep understanding of Control-Flow Integrity.Offers new insights on the relationship between function signature and compiler optimization.Demonstrates how CFI can be more efficient than Data
叢書名稱Information Security and Cryptography
圖書封面Titlebook: Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity;  Yan Lin Book 2021 The Editor(s) (if applicab
描述There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually inserts checks before indirect branches to consult a read-only table which stores the valid CFG information. However, this kind of read-only table can be overwritten by some kinds of attacks (e.g., the Rowhammer attack and data-oriented programming). The third component is to efficiently enforce the CFI policy. In current approaches CFI checks are always executed whenever there is an indirect control flow transfer. Therefore, it is critical to minimize the performance impact of CFI? checks..In this book, we propose novel solutions to handle these three fundamental components.To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and h
出版日期Book 2021
關(guān)鍵詞Control-Flow Integrity (CFI); Compiler Optimization; Dynamic Code Optimization; Information Security; Co
版次1
doihttps://doi.org/10.1007/978-3-030-73141-0
isbn_softcover978-3-030-73140-3
isbn_ebook978-3-030-73141-0Series ISSN 1619-7100 Series E-ISSN 2197-845X
issn_series 1619-7100
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
The information of publication is updating

書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity影響因子(影響力)




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity影響因子(影響力)學(xué)科排名




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity網(wǎng)絡(luò)公開(kāi)度




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity被引頻次




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity被引頻次學(xué)科排名




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity年度引用




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity年度引用學(xué)科排名




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity讀者反饋




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 20:31:05 | 只看該作者
1619-7100 zation.Demonstrates how CFI can be more efficient than Data There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG gene
板凳
發(fā)表于 2025-3-22 04:20:43 | 只看該作者
Introduction,In this chapter, we first introduce concepts and implementations of Control-Flow Integrity?[.], which is a fundamental approach to mitigating control-flow hijacking attacks, and then present practical issues of previous CFI systems and summarize how we address those problems.
地板
發(fā)表于 2025-3-22 05:05:28 | 只看該作者
5#
發(fā)表于 2025-3-22 10:34:00 | 只看該作者
When Function Signature Recovery Meets Compiler Optimization,Control-Flow Integrity (CFI)?[.] is a promising technique in defending against control-flow hijacking attacks?[.,.,.,.] by enforcing that runtime control flows follow valid paths in the program’s Control-Flow Graph (CFG).
6#
發(fā)表于 2025-3-22 16:10:24 | 只看該作者
7#
發(fā)表于 2025-3-22 19:27:39 | 只看該作者
8#
發(fā)表于 2025-3-22 22:10:57 | 只看該作者
Conclusions,This book makes contributions in recovering, embedding, and enforcing control-flow integrity policies.
9#
發(fā)表于 2025-3-23 02:46:48 | 只看該作者
Information Security and Cryptographyhttp://image.papertrans.cn/n/image/668460.jpg
10#
發(fā)表于 2025-3-23 07:57:51 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-20 02:31
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
牡丹江市| 汾阳市| 城市| 晴隆县| 田林县| 田阳县| 祁门县| 日照市| 格尔木市| 黑河市| 大宁县| 邯郸市| 泸州市| 乐山市| 钟祥市| 阜新市| 宣恩县| 东乌珠穆沁旗| 丰原市| 新津县| 大丰市| 民勤县| 仁怀市| 鱼台县| 灌云县| 商河县| 英山县| 东安县| 广南县| 南和县| 夏邑县| 贵阳市| 陆河县| 富宁县| 于田县| 泰兴市| 平顺县| 密山市| 梨树县| 土默特左旗| 百色市|