메뉴 건너뛰기




Volumn 50, Issue 1, 2017, Pages

Control-flow integrity: Precision, security, and performance

Author keywords

Control flow hijacking; Control flow integrity; Return oriented programming; Shadow stack

Indexed keywords

CRIME; EQUIVALENCE CLASSES; OPEN SOURCE SOFTWARE; PROGRAM COMPILERS;

EID: 85017104712     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/3054924     Document Type: Article
Times cited : (228)

References (87)
  • 4
    • 0345565890 scopus 로고    scopus 로고
    • A brief history of just-in-time
    • John Aycock. 2003. A brief history of just-in-time. Computing Surveys 35, 2, 97-113.
    • (2003) Computing Surveys , vol.35 , Issue.2 , pp. 97-113
    • Aycock, J.1
  • 5
    • 0030260329 scopus 로고    scopus 로고
    • Fast static analysis of C++ virtual function calls
    • David F. Bacon and Peter F. Sweeney. 1996. Fast static analysis of C++ virtual function calls. ACM SIGPLAN Notices 31, 10, 324-341.
    • (1996) ACM SIGPLAN Notices , vol.31 , Issue.10 , pp. 324-341
    • Bacon, D.F.1    Sweeney, P.F.2
  • 6
  • 10
    • 85076293126 scopus 로고    scopus 로고
    • ROP is still dangerous: Breaking modern defenses
    • Nicholas Carlini and David Wagner. 2014. ROP is still dangerous: Breaking modern defenses. In USENIX Security Symposium.
    • (2014) USENIX Security Symposium
    • Carlini, N.1    Wagner, D.2
  • 14
    • 85017180084 scopus 로고    scopus 로고
    • (2015) Retrieved March 1, 2017
    • Peter Collingbourne. 2015. LLVM - Control Flow Integrity. (2015). Retrieved March 1, 2017 from http://clang.llvm.org/docs/ControlFlowIntegrity.html.
    • (2015) LLVM - Control Flow Integrity
    • Collingbourne, P.1
  • 20
    • 84903161773 scopus 로고    scopus 로고
    • Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation
    • Lucas Davi, Patrick Koeberl, and Ahmad-Reza Sadeghi. 2014a. Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation. In Annual Design Automation Conference (DAC'14).
    • (2014) Annual Design Automation Conference (DAC'14)
    • Davi, L.1    Koeberl, P.2    Sadeghi, A.-R.3
  • 21
    • 85062385228 scopus 로고    scopus 로고
    • Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
    • Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi, and Fabian Monrose. 2014b. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In USENIX Security Symposium.
    • (2014) USENIX Security Symposium
    • Davi, L.1    Lehmann, D.2    Sadeghi, A.-R.3    Monrose, F.4
  • 26
    • 85017159271 scopus 로고    scopus 로고
    • Exploiting Adobe Flash Player in the era of Control Flow Guard
    • Retrieved March 1, 2017
    • Francisco Falcon. 2015. Exploiting Adobe Flash Player in the era of Control Flow Guard. BlackHat EU'15. Retrieved March 1, 2017 from https://www.blackhat.com/docs/eu-15/materials/eu-15-Falcon-Exploiting-Adobe-Flash-Player-In-The-Era-Of-Control-Flow-Guard.pdf.
    • (2015) BlackHat EU'15
    • Falcon, F.1
  • 37
    • 84888782524 scopus 로고    scopus 로고
    • Intel 64 and IA-32 Architectures
    • Intel Inc
    • Intel Inc. 2013. Intel 64 and IA-32 Architectures. Software Developer's Manual.
    • (2013) Software Developer's Manual
  • 41
    • 0020101510 scopus 로고
    • An architectural trail to threaded-code systems
    • Peter M. Kogge. 1982. An architectural trail to threaded-code systems. Computer 15, 3, 22-32. DOI:http://dx.doi.org/10.1109/MC.1982.1653970
    • (1982) Computer , vol.15 , Issue.3 , pp. 22-32
    • Kogge, P.M.1
  • 43
    • 33745794058 scopus 로고    scopus 로고
    • Context-sensitive points-to analysis: Is it worth it?
    • O. Lhoták and Laurie Hendren. 2006. Context-sensitive points-to analysis: Is it worth it? Compiler Construction 47-64.
    • (2006) Compiler Construction , pp. 47-64
    • Lhoták, O.1    Hendren, L.2
  • 46
    • 34548146785 scopus 로고    scopus 로고
    • Retrieved March 1, 2017
    • Microsoft. 2006. Data Execution Prevention (DEP). Retrieved March 1, 2017 from http://support.microsoft.com/kb/875352/EN-US/.
    • (2006) Data Execution Prevention (DEP)
  • 48
    • 85017129583 scopus 로고    scopus 로고
    • Retrieved March 1, 2017
    • Microsoft. 2015b. SetProcessValidCallTargets function. Retrieved March 1, 2017 from https://msdn.microsoft.com/en-us/enus/library/windows/desktop/dn934202(v=vs.85).aspx. (2015).
    • (2015) SetProcessValidCallTargets Function
  • 49
    • 0036986544 scopus 로고    scopus 로고
    • Parameterized object sensitivity for points-to and side-effect analyses for java
    • 2002
    • Ana Milanova, Atanas Rountev, and Barbara G. Ryder. 2002. Parameterized object sensitivity for points-to and side-effect analyses for java. ACM SIGSOFT Software Engineering Notes 27, 4 (2002), 1.
    • (2002) ACM SIGSOFT Software Engineering Notes , vol.27 , Issue.4 , pp. 1
    • Milanova, A.1    Rountev, A.2    Ryder, B.G.3
  • 58
    • 85017171868 scopus 로고    scopus 로고
    • Retrieved March 1, 2017
    • Ben Niu and Gang Tan. 2015a. MCFI readme. Retrieved March 1, 2017 from https://github.com/mcfi/MCFI/blob/master/README.md.
    • (2015) MCFI Readme
    • Niu, B.1    Tan, G.2
  • 63
    • 85017116970 scopus 로고    scopus 로고
    • Retrieved March 1, 2017
    • PaX-Team. 2003b. PaX Future. Retrieved March 1, 2017 from https://pax.grsecurity.net/docs/pax-future.txt.
    • (2003) PaX Future
  • 71
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • Hovav Shacham. 2007. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In CCS'07.
    • (2007) CCS'07
    • Shacham, H.1
  • 72
    • 0002823436 scopus 로고
    • Two approaches to interprocedural data flow analysis
    • Steven S. Muchnick and Neil D. Jones (Eds.). Prentice Hall, Upper Saddle River, NJ
    • Micha Sharir and Amir Pnueli. 1981. Two approaches to interprocedural data flow analysis. In Program Flow Analysis, Steven S. Muchnick and Neil D. Jones (Eds.). Prentice Hall, Upper Saddle River, NJ.
    • (1981) Program Flow Analysis
    • Sharir, M.1    Pnueli, A.2
  • 78
    • 17944376454 scopus 로고    scopus 로고
    • Scalable propagation-based call graph construction algorithms
    • Frank Tip and Jens Palsberg. 2000. Scalable propagation-based call graph construction algorithms. ACM SIGPLAN Notices 35, 10, 281-293.
    • (2000) ACM SIGPLAN Notices , vol.35 , Issue.10 , pp. 281-293
    • Tip, F.1    Palsberg, J.2
  • 79
    • 84874182338 scopus 로고    scopus 로고
    • Retrieved March 1, 2017 (2004)
    • Arjan van de Ven and Ingo Molnar. 2004. Exec Shield. Retrieved March 1, 2017 from https://www.redhat.com/f/pdf/rhel/WHP0006US-Execshield.pdf. (2004).
    • (2004) Exec Shield
    • Van De Ven, A.1    Molnar, I.2
  • 81
    • 84869420078 scopus 로고    scopus 로고
    • HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • Zhi Wang and Xuxian Jiang. 2010. HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In IEEE S&P'10.
    • (2010) IEEE S&P'10
    • Wang, Z.1    Jiang, X.2
  • 82
    • 85017129115 scopus 로고    scopus 로고
    • Windows 10 Mitigation Improvements
    • Retrieved March 1, 2017
    • David Weston and Matt Miller. 2016. Windows 10 Mitigation Improvements. BlackHat'16. Retrieved March 1, 2017 from https://www.blackhat.com/docs/us-16/materials/us-16-Weston-Windows-10-Mitigation-Improvements.pdf.
    • (2016) BlackHat'16
    • Weston, D.1    Miller, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.