Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Control-flow integrity: Precision, security, and performance
Memory corruption errors in C/C++ programs remain the most common source of security
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …
Griffin: Guarding control flows using intel processor trace
Researchers are actively exploring techniques to enforce control-flow integrity (CFI), which
restricts program execution to a predefined set of targets for each indirect control transfer to …
restricts program execution to a predefined set of targets for each indirect control transfer to …
Sherloc: Secure and holistic control-flow violation detection on embedded systems
Microcontroller-based embedded systems are often programmed in low-level languages
and are vulnerable to control-flow hijacking attacks. One approach to prevent such attacks is …
and are vulnerable to control-flow hijacking attacks. One approach to prevent such attacks is …
Fineibt: Fine-grain control-flow enforcement with indirect branch tracking
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace
This paper presents PT-CFI, a new backward-edge control flow violation detection system
based on a novel use of a recently introduced hardware feature called Intel Processor Trace …
based on a novel use of a recently introduced hardware feature called Intel Processor Trace …
Transparent and efficient cfi enforcement with intel processor trace
Y Liu, P Shi, X Wang, H Chen, B Zang… - … Symposium on High …, 2017 - ieeexplore.ieee.org
Current control flow integrity (CFI) enforcement approaches either require instrumenting
application executables and even shared libraries, or are unable to defend against …
application executables and even shared libraries, or are unable to defend against …
Multi-target tracking-linking identities using bayesian network inference
Multi-target tracking requires locating the targets and labeling their identities. The latter is a
challenge when many targets, with indistinct appearances, frequently occlude one another …
challenge when many targets, with indistinct appearances, frequently occlude one another …
{PHMon}: A programmable hardware monitor and its security use cases
There has been a resurgent trend in the industry to enforce a variety of security policies in
hardware. The current trend for develo** dedicated hardware security extensions is an …
hardware. The current trend for develo** dedicated hardware security extensions is an …
InsectACIDE: Debugger-based holistic asynchronous CFI for embedded system
Real-time and embedded systems are predominantly written in C, a language that is
notoriously not memory safe. This has led to widespread memory-corruption vulnerabilities …
notoriously not memory safe. This has led to widespread memory-corruption vulnerabilities …
Boosting the precision of virtual call integrity protection with partial pointer analysis for C++
We present, VIP, an approach to boosting the precision of Virtual call Integrity Protection for
large-scale real-world C++ programs (eg, Chrome) by using pointer analysis for the first …
large-scale real-world C++ programs (eg, Chrome) by using pointer analysis for the first …