Code-pointer integrity

V Kuznetzov, L Szekeres, M Payer, G Candea… - The Continuing Arms …, 2018 - dl.acm.org
In this chapter, we describe code-pointer integrity (CPI), a new design point that guarantees
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …

[PDF][PDF] MARX: Uncovering Class Hierarchies in C++ Programs.

A Pawlowski, M Contag, V van der Veen, C Ouwehand… - NDSS, 2017 - download.vusec.net
Reverse engineering of binary executables is a difficult task which gets more involved by the
way compilers translate high-level concepts used in paradigms such as objectoriented …

cfi: Type-assisted control flow integrity for x86-64 binaries

P Muntean, M Fischer, G Tan, Z Lin… - … on Research in Attacks …, 2018 - Springer
Programs aiming for low runtime overhead and high availability draw on several object-
oriented features available in the C/C++ programming language, such as dynamic object …

Boosting the precision of virtual call integrity protection with partial pointer analysis for C++

X Fan, Y Sui, X Liao, J Xue - Proceedings of the 26th ACM SIGSOFT …, 2017 - dl.acm.org
We present, VIP, an approach to boosting the precision of Virtual call Integrity Protection for
large-scale real-world C++ programs (eg, Chrome) by using pointer analysis for the first …

VTPin: practical VTable hijacking protection for binaries

P Sarbinowski, VP Kemerlis, C Giuffrida… - Proceedings of the …, 2016 - dl.acm.org
VTable hijacking has lately been promoted to the de facto technique for exploiting C++
applications, and in particular web browsers. VTables, however, can be manipulated without …

Towards an energy-efficient hash-based message authentication code (HMAC)

CE Castellon, S Roy, OP Kreidl… - 2022 IEEE 13th …, 2022 - ieeexplore.ieee.org
Hash-based message authentication code (HMAC) involves a secret cryptographic key and
an underlying crypto-graphic hash function. HMAC is used to simultaneously verify both …

Analyzing control flow integrity with LLVM-CFI

P Muntean, M Neumayer, Z Lin, G Tan… - Proceedings of the 35th …, 2019 - dl.acm.org
Control-flow hijacking attacks are used to perform malicious computations. Current solutions
for assessing the attack surface after a control flow integrity (CFI) policy was applied can …

Exploiting mixed binaries

M Papaevripides, E Athanasopoulos - ACM Transactions on Privacy and …, 2021 - dl.acm.org
Unsafe programming systems are still very popular, despite the shortcomings due to several
published memory-corruption vulnerabilities. Toward defending memory corruption …

[图书][B] The Continuing Arms Race: Code-Reuse Attacks and Defenses

P Larsen, AR Sadeghi - 2018 - dl.acm.org
As human activities have moved to the digital domain, so have all the well-known malicious
behaviors including fraud, theft, and other trickery. There is no silver bullet, and each …

τcfi: Type-assisted control flow integrity for x86-64 binaries

J Grossklags, C Eckert - … , Crete, Greece, September 10-12, 2018 …, 2018 - books.google.com
Programs aiming for low runtime overhead and high availability draw on several object-
oriented features available in the C/C++ programming language, such as dynamic object …