找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity; Yan Lin Book 2021 The Editor(s) (if applicab

[復(fù)制鏈接]
查看: 40031|回復(fù): 37
樓主
發(fā)表于 2025-3-21 19:33:35 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
編輯Yan Lin
視頻videohttp://file.papertrans.cn/669/668460/668460.mp4
概述Provides deep understanding of Control-Flow Integrity.Offers new insights on the relationship between function signature and compiler optimization.Demonstrates how CFI can be more efficient than Data
叢書名稱Information Security and Cryptography
圖書封面Titlebook: Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity;  Yan Lin Book 2021 The Editor(s) (if applicab
描述There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually inserts checks before indirect branches to consult a read-only table which stores the valid CFG information. However, this kind of read-only table can be overwritten by some kinds of attacks (e.g., the Rowhammer attack and data-oriented programming). The third component is to efficiently enforce the CFI policy. In current approaches CFI checks are always executed whenever there is an indirect control flow transfer. Therefore, it is critical to minimize the performance impact of CFI? checks..In this book, we propose novel solutions to handle these three fundamental components.To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and h
出版日期Book 2021
關(guān)鍵詞Control-Flow Integrity (CFI); Compiler Optimization; Dynamic Code Optimization; Information Security; Co
版次1
doihttps://doi.org/10.1007/978-3-030-73141-0
isbn_softcover978-3-030-73140-3
isbn_ebook978-3-030-73141-0Series ISSN 1619-7100 Series E-ISSN 2197-845X
issn_series 1619-7100
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
The information of publication is updating

書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity影響因子(影響力)




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity影響因子(影響力)學(xué)科排名




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity網(wǎng)絡(luò)公開度




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity被引頻次




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity被引頻次學(xué)科排名




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity年度引用




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity年度引用學(xué)科排名




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity讀者反饋




書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 20:31:05 | 只看該作者
1619-7100 zation.Demonstrates how CFI can be more efficient than Data There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG gene
板凳
發(fā)表于 2025-3-22 04:20:43 | 只看該作者
Introduction,In this chapter, we first introduce concepts and implementations of Control-Flow Integrity?[.], which is a fundamental approach to mitigating control-flow hijacking attacks, and then present practical issues of previous CFI systems and summarize how we address those problems.
地板
發(fā)表于 2025-3-22 05:05:28 | 只看該作者
5#
發(fā)表于 2025-3-22 10:34:00 | 只看該作者
When Function Signature Recovery Meets Compiler Optimization,Control-Flow Integrity (CFI)?[.] is a promising technique in defending against control-flow hijacking attacks?[.,.,.,.] by enforcing that runtime control flows follow valid paths in the program’s Control-Flow Graph (CFG).
6#
發(fā)表于 2025-3-22 16:10:24 | 只看該作者
7#
發(fā)表于 2025-3-22 19:27:39 | 只看該作者
8#
發(fā)表于 2025-3-22 22:10:57 | 只看該作者
Conclusions,This book makes contributions in recovering, embedding, and enforcing control-flow integrity policies.
9#
發(fā)表于 2025-3-23 02:46:48 | 只看該作者
Information Security and Cryptographyhttp://image.papertrans.cn/n/image/668460.jpg
10#
發(fā)表于 2025-3-23 07:57:51 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-20 00:08
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
黔江区| 虹口区| 长兴县| 凯里市| 灌阳县| 怀宁县| 兴业县| 抚宁县| 奉新县| 郧西县| 宁津县| 乐陵市| 兴和县| 乌拉特中旗| 富锦市| 苍溪县| 合江县| 项城市| 辽中县| 华坪县| 平阴县| 中超| 敦煌市| 康定县| 上杭县| 睢宁县| 哈巴河县| 廉江市| 名山县| 杭州市| 隆昌县| 科技| 泰顺县| 凌云县| 昭觉县| 平安县| 乌恰县| 扎鲁特旗| 乌兰浩特市| 蓬莱市| 临沭县|