SoK: Shining light on shadow stacks

N Burow, X Zhang, M Payer - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs.
Control-Flow Integrity (CFI) solutions mitigate these attacks on the forward edge, ie, indirect …

Where does it go? refining indirect-call targets with multi-layer type analysis

K Lu, H Hu - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
System software commonly uses indirect calls to realize dynamic program behaviors.
However, indirect-calls also bring challenges to constructing a precise control-flow graph …

Debloating software through {Piece-Wise} compilation and loading

A Quach, A Prakash, L Yan - 27th USENIX security symposium (USENIX …, 2018 - usenix.org
Programs are bloated. Our study shows that only 5% of libc is used on average across the
Ubuntu Desktop envi-ronment (2016 programs); the heaviest user, vlc media player, only …

HDFI: Hardware-assisted data-flow isolation

C Song, H Moon, M Alam, I Yun, B Lee… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing
defense mechanisms are inadequate; in general, the software-based approaches are not …

TypeSan: Practical type confusion detection

I Haller, Y Jeon, H Peng, M Payer, C Giuffrida… - Proceedings of the …, 2016 - dl.acm.org
The low-level C++ programming language is ubiquitously used for its modularity and
performance. Typecasting is a fundamental concept in C++ (and object-oriented …

Tchecker: Precise static inter-procedural analysis for detecting taint-style vulnerabilities in php applications

C Luo, P Li, W Meng - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
PHP applications provide various interfaces for end-users to interact with on the Web. They
thus are prone to taint-style vulnerabilities such as SQL injection and cross-site scripting. For …

Origin-sensitive control flow integrity

MR Khandaker, W Liu, A Naser, Z Wang… - 28th USENIX Security …, 2019 - usenix.org
CFI is an effective, generic defense against control-flow hijacking attacks, especially for
C/C++ programs. However, most previous CFI systems have poor security as demonstrated …

Finding cracks in shields: On the security of control flow integrity mechanisms

Y Li, M Wang, C Zhang, X Chen, S Yang… - Proceedings of the 2020 …, 2020 - dl.acm.org
Control-flow integrity (CFI) is a promising technique to mitigate control-flow hijacking attacks.
In the past decade, dozens of CFI mechanisms have been proposed by researchers …

Hextype: Efficient detection of type confusion errors for c++

Y Jeon, P Biswas, S Carr, B Lee, M Payer - Proceedings of the 2017 …, 2017 - dl.acm.org
Type confusion, often combined with use-after-free, is the main attack vector to compromise
modern C++ software like browsers or virtual machines. Typecasting is a core principle that …

[PDF][PDF] Cfixx: Object type integrity for c++ virtual dispatch

N Burow, D McKee, SA Carr, M Payer - Symposium on Network and …, 2018 - nebelwelt.net
C++ relies on object type information for dynamic dispatch and casting. The association of
type information to an object is implemented via the virtual table pointer, which is stored in …