Inferring aliasing and buffer-size information is important to understanding a C program's memory layout, which is critical to program analysis and security-related tasks. However …
Y Cai, Y Jin, C Zhang - 33nd USENIX Security Symposium (USENIX …, 2024 - usenix.org
When dealing with millions of lines of C code, we still cannot have the cake and eat it: type analysis for call graph construction is scalable yet highly imprecise. We address this …
CFI is an effective, generic defense against control-flow hijacking attacks, especially for C/C++ programs. However, most previous CFI systems have poor security as demonstrated …
Y Li, M Wang, C Zhang, X Chen, S Yang… - Proceedings of the 2020 …, 2020 - dl.acm.org
Control-flow integrity (CFI) is a promising technique to mitigate control-flow hijacking attacks. In the past decade, dozens of CFI mechanisms have been proposed by researchers …
End-host runtime monitors (eg, CFI, system call IDS) flag processes in response to symptoms of a possible attack. Unfortunately, the symptom (eg, invalid control transfer) may …
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
RT Gollapudi, G Yuksek, D Demicco… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Control flow attacks exploit software vulnerabilities to divert the flow of control into unintended paths to ultimately execute attack code. This paper explores the use of …
System calls are a critical building block in many serious security attacks, such as control- flow hijacking and privilege escalation attacks. Security-sensitive system calls (eg, execve …
Maliciously-overwritten function pointers in C programs often lead to arbitrary code execution. In principle, forward CFI schemes mitigate this problem by restricting indirect …