作者
Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose
发表日期
2014
研讨会论文
23rd USENIX Security Symposium (USENIX Security 14)
页码范围
401-416
简介
Return-oriented programming (ROP) offers a robust attack technique that has, not surprisingly, been extensively used to exploit bugs in modern software programs (eg, web browsers and PDF readers). ROP attacks require no code injection, and have already been shown to be powerful enough to bypass fine-grained memory randomization (ASLR) defenses. To counter this ingenious attack strategy, several proposals for enforcement of (coarse-grained) control-flow integrity (CFI) have emerged. The key argument put forth by these works is that coarse-grained CFI policies are sufficient to prevent ROP attacks. As this reasoning has gained traction, ideas put forth in these proposals have even been incorporated into coarse-grained CFI defenses in widely adopted tools (eg, Microsoft’s EMET framework).
引用总数
20142015201620172018201920202021202220232024106373775141553228319
学术搜索中的文章
L Davi, AR Sadeghi, D Lehmann, F Monrose - 23rd USENIX Security Symposium (USENIX Security …, 2014