找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity; Yan Lin Book 2021 The Editor(s) (if applicab

[復(fù)制鏈接]
查看: 40036|回復(fù): 37
樓主
發(fā)表于 2025-3-21 19:33:35 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
編輯Yan Lin
視頻videohttp://file.papertrans.cn/669/668460/668460.mp4
概述Provides deep understanding of Control-Flow Integrity.Offers new insights on the relationship between function signature and compiler optimization.Demonstrates how CFI can be more efficient than Data
叢書名稱Information Security and Cryptography
圖書封面Titlebook: Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity;  Yan Lin Book 2021 The Editor(s) (if applicab
描述There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually inserts checks before indirect branches to consult a read-only table which stores the valid CFG information. However, this kind of read-only table can be overwritten by some kinds of attacks (e.g., the Rowhammer attack and data-oriented programming). The third component is to efficiently enforce the CFI policy. In current approaches CFI checks are always executed whenever there is an indirect control flow transfer. Therefore, it is critical to minimize the performance impact of CFI? checks..In this book, we propose novel solutions to handle these three fundamental components.To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and h
出版日期Book 2021
關(guān)鍵詞Control-Flow Integrity (CFI); Compiler Optimization; Dynamic Code Optimization; Information Security; Co
版次1
doihttps://doi.org/10.1007/978-3-030-73141-0
isbn_softcover978-3-030-73140-3
isbn_ebook978-3-030-73141-0Series ISSN 1619-7100 Series E-ISSN 2197-845X
issn_series 1619-7100
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
The information of publication is updating

書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity影響因子(影響力)




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity影響因子(影響力)學(xué)科排名




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity網(wǎng)絡(luò)公開(kāi)度




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity被引頻次




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity被引頻次學(xué)科排名




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity年度引用




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity年度引用學(xué)科排名




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity讀者反饋




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 20:31:05 | 只看該作者
1619-7100 zation.Demonstrates how CFI can be more efficient than Data There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG gene
板凳
發(fā)表于 2025-3-22 04:20:43 | 只看該作者
Introduction,In this chapter, we first introduce concepts and implementations of Control-Flow Integrity?[.], which is a fundamental approach to mitigating control-flow hijacking attacks, and then present practical issues of previous CFI systems and summarize how we address those problems.
地板
發(fā)表于 2025-3-22 05:05:28 | 只看該作者
5#
發(fā)表于 2025-3-22 10:34:00 | 只看該作者
When Function Signature Recovery Meets Compiler Optimization,Control-Flow Integrity (CFI)?[.] is a promising technique in defending against control-flow hijacking attacks?[.,.,.,.] by enforcing that runtime control flows follow valid paths in the program’s Control-Flow Graph (CFG).
6#
發(fā)表于 2025-3-22 16:10:24 | 只看該作者
7#
發(fā)表于 2025-3-22 19:27:39 | 只看該作者
8#
發(fā)表于 2025-3-22 22:10:57 | 只看該作者
Conclusions,This book makes contributions in recovering, embedding, and enforcing control-flow integrity policies.
9#
發(fā)表于 2025-3-23 02:46:48 | 只看該作者
Information Security and Cryptographyhttp://image.papertrans.cn/n/image/668460.jpg
10#
發(fā)表于 2025-3-23 07:57:51 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-20 02:31
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
花莲县| 手游| 谢通门县| 微山县| 寿光市| 轮台县| 潜江市| 宿迁市| 内黄县| 崇明县| 纳雍县| 新源县| 苍山县| 札达县| 朝阳市| 武汉市| 清新县| 罗平县| 中西区| 抚顺市| 罗田县| 淄博市| 益阳市| 武威市| 彩票| 横山县| 永清县| 梅河口市| 安仁县| 青田县| 芜湖市| 朝阳区| 克什克腾旗| 江津市| 彭山县| 荥经县| 霞浦县| 浦城县| 贵溪市| 绥芬河市| 额济纳旗|