Feel Me Flow: A Review of Control-Flow Integrity Methods for User and Kernel Space

نویسندگان

  • Irene Díez-Franco
  • Igor Santos
چکیده

Attackers have evolved classic code-injection attacks, such as those caused by buffer overflows to sophisticated Turing-complete codereuse attacks. Control-Flow Integrity (CFI) is a defence mechanism to eliminate control-flow hijacking attacks caused by common memory errors. CFI relies on static analysis for the creation of a program’s controlflow graph (CFG), then at runtime CFI ensures that the program follows the legitimate path. Thereby, when an attacker tries to execute malicious shellcode, CFI detects an unintended path and aborts execution. CFI heavily relies on static analysis for the accurate generation of the control-flow graph, and its security depends on how strictly the CFG is generated and enforced. This paper reviews the CFI schemes proposed over the last ten years and assesses their security guarantees against advanced exploitation techniques.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AFRL-OSR-VA-TR-2015-0149 Information Flow Integrity for Systems of Independently-Developed Components

The aim of this project is to enable enforcement of integrity safe in systems of independently-developed components. In this project, we explore this problem from three perspectives. First, we developed integrity safety properties and mechanisms to enforce them. In particular, we developed resource retrieval (access) integrity, which protects programs when retrieving system resources, and imple...

متن کامل

Kernel Integrity Protection from Untrusted Extensions Using Dynamic Binary Instrumentation

Device drivers are the major source of concern for maintaining security and reliability of an operating system. Many of these device drivers, developed by third parties, get installed in kernel address space as extensions. These extensions are implicitly trusted and are allowed to interact with each other and kernel through well-defined interfaces and by sharing data in an uncontrolled manner. ...

متن کامل

MODELING OF FLOW NUMBER OF ASPHALT MIXTURES USING A MULTI–KERNEL BASED SUPPORT VECTOR MACHINE APPROACH

Flow number of asphalt–aggregate mixtures as an explanatory factor has been proposed in order to assess the rutting potential of asphalt mixtures. This study proposes a multiple–kernel based support vector machine (MK–SVM) approach for modeling of flow number of asphalt mixtures. The MK–SVM approach consists of weighted least squares–support vector machine (WLS–SVM) integrating two kernel funct...

متن کامل

P-146: Fertility and Flow Cytometric Evaluations of Frozen-Thawed Rooster Semen in Cryopreservation Medium Containing Low Density Lipoprotein

Background: Frozen-thawed rooster semen is not reliable for use in artificial insemination in commercial stocks. Low density lipoprotein (LDL) has been assessed for effectiveness as a cryoprotectant in the extender to improve the quality of frozen-thawed rooster semen. Although LDL has been evaluated in a few studies in other species for semen cryopreservation, to date, no study has been conduc...

متن کامل

Deconstructing Xen

Hypervisors have quickly become essential but are vulnerable to attack. Unfortunately, efficiently hardening hypervisors is challenging because they lack a privileged security monitor and decomposition strategies. In this work we systematically analyze the 191 Xen hypervisor vulnerabilities from Xen Security Advisories, revealing that the majority (144) are in the core hypervisor not Dom0. We t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016