Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey

S Kumar, D Moolchandani, SR Sarangi - Journal of Systems Architecture, 2022 - Elsevier
Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted
data centers; hence, the confidentiality and integrity of the code and data are of paramount …

Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology

S Li, W Wang, W Li, D Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
Code Reuse Attacks (CRA) represent a type of control flow hijacking that attackers exploit to
manipulate the standard program execution path, resulting in abnormal processor …

Parity Shadow Stack: Dynamic Instrumentation based Control Flow Security for IoT Devices

CQ Cao - 2023 IEEE International Performance, Computing …, 2023 - ieeexplore.ieee.org
One of the challenges in ensuring the security of Internet of Things (IoT) devices involves
preserving control flow integrity (CFI) against return-oriented programming (ROP) attacks …

Address Space Coloring

R Pasculano - 2021 - etda.libraries.psu.edu
C and C++ have suffered from out-of-bounds errors since their inception. These languages
are incapable of protecting from all out-of-bounds errors and there are no plans to add any …