Control-flow integrity: Precision, security, and performance
Memory corruption errors in C/C++ programs remain the most common source of security
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …
Flush+ Flush: a fast and stealthy cache attack
Research on cache attacks has shown that CPU caches leak significant information.
Proposed detection mechanisms assume that all cache attacks cause more cache hits and …
Proposed detection mechanisms assume that all cache attacks cause more cache hits and …
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
F Schuster, T Tendyck, C Liebchen… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Code reuse attacks such as return-oriented programming (ROP) have become prevalent
techniques to exploit memory corruption vulnerabilities in software programs. A variety of …
techniques to exploit memory corruption vulnerabilities in software programs. A variety of …
Practical control flow integrity and randomization for binary executables
Control Flow Integrity (CFI) provides a strong protection against modern control-flow
hijacking attacks. However, performance and compatibility issues limit its adoption. We …
hijacking attacks. However, performance and compatibility issues limit its adoption. We …
On the feasibility of online malware detection with performance counters
The proliferation of computers in any domain is followed by the proliferation of malware in
that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits …
that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits …
Cloudradar: A real-time side-channel attack detection system in clouds
We present CloudRadar, a system to detect, and hence mitigate, cache-based side-channel
attacks in multi-tenant cloud systems. CloudRadar operates by correlating two events: first, it …
attacks in multi-tenant cloud systems. CloudRadar operates by correlating two events: first, it …
{ROP} is still dangerous: Breaking modern defenses
Return Oriented Programming (ROP) has become the exploitation technique of choice for
modern memory-safety vulnerability attacks. Recently, there have been multiple attempts at …
modern memory-safety vulnerability attacks. Recently, there have been multiple attempts at …
Sok: The challenges, pitfalls, and perils of using hardware performance counters for security
Hardware Performance Counters (HPCs) have been available in processors for more than a
decade. These counters can be used to monitor and measure events that occur at the CPU …
decade. These counters can be used to monitor and measure events that occur at the CPU …
Practical context-sensitive CFI
Current Control-Flow Integrity (CFI) implementations track control edges individually,
insensitive to the context of preceding edges. Recent work demonstrates that this leaves …
insensitive to the context of preceding edges. Recent work demonstrates that this leaves …
Transparent {ROP} exploit mitigation using indirect branch tracing
Return-oriented programming (ROP) has become the primary exploitation technique for
system compromise in the presence of non-executable page protections. ROP exploits are …
system compromise in the presence of non-executable page protections. ROP exploits are …