2021
DOI: 10.48550/arxiv.2103.04456
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Comparative Analysis and Enhancement of CFG-based Hardware-Assisted CFI Schemes

Abstract: Subverting the flow of instructions (e.g., by use of code-reuse attacks) still poses a serious threat to the security of today's systems. Various control flow integrity (CFI) schemes have been proposed as a powerful technique to detect and mitigate such attacks. In recent years, many hardwareassisted implementations of CFI enforcement based on control flow graphs (CFGs) have been presented by academia. Such approaches check whether control flow transfers follow the intended CFG by limiting the valid target add… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 19 publications
(25 reference statements)
0
1
0
Order By: Relevance
“…These works typically provide instructions that set the CFI rules before the control transfer instructions and check the CFI rules at the target address. However, as explained in Section 3.1 , there is a problem in HCFI [ 8 ], SWT [ 6 ] and EXCEC [ 26 ]. In short, they have to add a trampoline code through complex code analysis to support context-sensitive CFI rules.…”
Section: Related Workmentioning
confidence: 99%
“…These works typically provide instructions that set the CFI rules before the control transfer instructions and check the CFI rules at the target address. However, as explained in Section 3.1 , there is a problem in HCFI [ 8 ], SWT [ 6 ] and EXCEC [ 26 ]. In short, they have to add a trampoline code through complex code analysis to support context-sensitive CFI rules.…”
Section: Related Workmentioning
confidence: 99%