Code-pointer integrity

V Kuznetzov, L Szekeres, M Payer, G Candea… - The Continuing Arms …, 2018‏ - dl.acm.org
In this chapter, we describe code-pointer integrity (CPI), a new design point that guarantees
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …

Finding the dwarf: recovering precise types from WebAssembly binaries

D Lehmann, M Pradel - Proceedings of the 43rd ACM SIGPLAN …, 2022‏ - dl.acm.org
The increasing popularity of WebAssembly creates a demand for understanding and reverse
engineering WebAssembly binaries. Recovering high-level function types is an important …

Fineibt: Fine-grain control-flow enforcement with indirect branch tracking

AJ Gaidis, J Moreira, K Sun, A Milburn… - Proceedings of the 26th …, 2023‏ - dl.acm.org
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …

Practical program modularization with type-based dependence analysis

K Lu - 2023 IEEE Symposium on Security and Privacy (SP), 2023‏ - ieeexplore.ieee.org
Today's software programs are bloating and have become extremely complex. As there is
typically no internal isolation among modules in a program, a vulnerability can be exploited …

CodeArmor: Virtualizing the code space to counter disclosure attacks

X Chen, H Bos, C Giuffrida - 2017 IEEE European Symposium …, 2017‏ - ieeexplore.ieee.org
Code diversification is an effective strategy to prevent modern code-reuse exploits.
Unfortunately, diversification techniques are inherently vulnerable to information disclosure …

Using logic programming to recover c++ classes and methods from compiled executables

EJ Schwartz, CF Cohen, M Duggan, J Gennari… - Proceedings of the …, 2018‏ - dl.acm.org
High-level C++ source code abstractions such as classes and methods greatly assist human
analysts and automated algorithms alike when analyzing C++ programs. Unfortunately …

Typeminer: Recovering types in binary programs using machine learning

A Maier, H Gascon, C Wressnegger, K Rieck - Detection of Intrusions and …, 2019‏ - Springer
Closed-source software is a major hurdle for assessing the security of computer systems. In
absence of source code, it is particularly difficult to locate vulnerabilities and malicious …

Typesqueezer: When static recovery of function signatures for binary executables meets dynamic analysis

Z Lin, J Li, B Li, H Ma, D Gao, J Ma - Proceedings of the 2023 ACM …, 2023‏ - dl.acm.org
Control-Flow Integrity (CFI) is considered a promising solution in thwarting advanced code-
reuse attacks. While the problem of backward-edge protection in CFI is nearly closed …

RevARM: A platform-agnostic ARM binary rewriter for security applications

T Kim, CH Kim, H Choi, Y Kwon… - Proceedings of the 33rd …, 2017‏ - dl.acm.org
ARM is the leading processor architecture in the emerging mobile and embedded market.
Unfortunately, there has been a myriad of security issues on both mobile and embedded …

cfi: Type-assisted control flow integrity for x86-64 binaries

P Muntean, M Fischer, G Tan, Z Lin… - … on Research in Attacks …, 2018‏ - Springer
Programs aiming for low runtime overhead and high availability draw on several object-
oriented features available in the C/C++ programming language, such as dynamic object …