Proceedings of the 9th Workshop on Software Security, Protection, and Reverse Engineering 2019
DOI: 10.1145/3371307.3371314
|View full text |Cite
|
Sign up to set email alerts
|

A case against indirect jumps for secure programs

Abstract: A desired property of secure programs is control flow integrity (CFI): an attacker must not be able to alter how instructions are chained as specified in the program. Numerous techniques try to achieve this property with various trade-offs. But to achieve fine-grained CFI, one is required to extract a precise control flow graph (CFG), describing how instructions are chained together. Unfortunately it is not achievable in general. In this paper, we propose a way to overcome this impossibility result by restrict… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…The precision of the resulting CFG directly translates to granularity of CFI protection. Extracting the possible set of targets of indirect control flow transfers in order to construct such a CFG perfectly is (in general) undecidable [18] and out of the focus of this work.…”
Section: B Instrumentationmentioning
confidence: 99%
“…The precision of the resulting CFG directly translates to granularity of CFI protection. Extracting the possible set of targets of indirect control flow transfers in order to construct such a CFG perfectly is (in general) undecidable [18] and out of the focus of this work.…”
Section: B Instrumentationmentioning
confidence: 99%