書目名稱 | Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity | 編輯 | Yan Lin | 視頻video | http://file.papertrans.cn/669/668460/668460.mp4 | 概述 | Provides deep understanding of Control-Flow Integrity.Offers new insights on the relationship between function signature and compiler optimization.Demonstrates how CFI can be more efficient than Data | 叢書名稱 | Information Security and Cryptography | 圖書封面 |  | 描述 | There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually inserts checks before indirect branches to consult a read-only table which stores the valid CFG information. However, this kind of read-only table can be overwritten by some kinds of attacks (e.g., the Rowhammer attack and data-oriented programming). The third component is to efficiently enforce the CFI policy. In current approaches CFI checks are always executed whenever there is an indirect control flow transfer. Therefore, it is critical to minimize the performance impact of CFI? checks..In this book, we propose novel solutions to handle these three fundamental components.To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and h | 出版日期 | Book 2021 | 關(guān)鍵詞 | Control-Flow Integrity (CFI); Compiler Optimization; Dynamic Code Optimization; Information Security; Co | 版次 | 1 | doi | https://doi.org/10.1007/978-3-030-73141-0 | isbn_softcover | 978-3-030-73140-3 | isbn_ebook | 978-3-030-73141-0Series ISSN 1619-7100 Series E-ISSN 2197-845X | issn_series | 1619-7100 | copyright | The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl |
The information of publication is updating
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity影響因子(影響力) 
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity影響因子(影響力)學(xué)科排名 
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity網(wǎng)絡(luò)公開度 
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity網(wǎng)絡(luò)公開度學(xué)科排名 
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity被引頻次 
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity被引頻次學(xué)科排名 
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity年度引用 
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity年度引用學(xué)科排名 
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity讀者反饋 
書目名稱Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity讀者反饋學(xué)科排名 
|
|
|