Control-flow integrity: Precision, security, and performance

N Burow, SA Carr, J Nash, P Larsen, M Franz… - ACM Computing …, 2017 - dl.acm.org
Memory corruption errors in C/C++ programs remain the most common source of security
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …

Griffin: Guarding control flows using intel processor trace

X Ge, W Cui, T Jaeger - ACM SIGPLAN Notices, 2017 - dl.acm.org
Researchers are actively exploring techniques to enforce control-flow integrity (CFI), which
restricts program execution to a predefined set of targets for each indirect control transfer to …

Sherloc: Secure and holistic control-flow violation detection on embedded systems

X Tan, Z Zhao - Proceedings of the 2023 ACM SIGSAC Conference on …, 2023 - dl.acm.org
Microcontroller-based embedded systems are often programmed in low-level languages
and are vulnerable to control-flow hijacking attacks. One approach to prevent such attacks is …

Fineibt: Fine-grain control-flow enforcement with indirect branch tracking

AJ Gaidis, J Moreira, K Sun, A Milburn… - Proceedings of the 26th …, 2023 - dl.acm.org
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …

PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace

Y Gu, Q Zhao, Y Zhang, Z Lin - Proceedings of the Seventh ACM on …, 2017 - dl.acm.org
This paper presents PT-CFI, a new backward-edge control flow violation detection system
based on a novel use of a recently introduced hardware feature called Intel Processor Trace …

Transparent and efficient cfi enforcement with intel processor trace

Y Liu, P Shi, X Wang, H Chen, B Zang… - … Symposium on High …, 2017 - ieeexplore.ieee.org
Current control flow integrity (CFI) enforcement approaches either require instrumenting
application executables and even shared libraries, or are unable to defend against …

Multi-target tracking-linking identities using bayesian network inference

P Nillius, J Sullivan, S Carlsson - 2006 IEEE Computer Society …, 2006 - ieeexplore.ieee.org
Multi-target tracking requires locating the targets and labeling their identities. The latter is a
challenge when many targets, with indistinct appearances, frequently occlude one another …

{PHMon}: A programmable hardware monitor and its security use cases

L Delshadtehrani, S Canakci, B Zhou… - 29th USENIX Security …, 2020 - usenix.org
There has been a resurgent trend in the industry to enforce a variety of security policies in
hardware. The current trend for develo** dedicated hardware security extensions is an …

InsectACIDE: Debugger-based holistic asynchronous CFI for embedded system

Y Wang, CL Mack, X Tan, N Zhang… - 2024 IEEE 30th Real …, 2024 - ieeexplore.ieee.org
Real-time and embedded systems are predominantly written in C, a language that is
notoriously not memory safe. This has led to widespread memory-corruption vulnerabilities …

Boosting the precision of virtual call integrity protection with partial pointer analysis for C++

X Fan, Y Sui, X Liao, J Xue - Proceedings of the 26th ACM SIGSOFT …, 2017 - dl.acm.org
We present, VIP, an approach to boosting the precision of Virtual call Integrity Protection for
large-scale real-world C++ programs (eg, Chrome) by using pointer analysis for the first …