<--- Back to Details
First PageDocument Content
Computer architecture / Software / Computing / Operating system kernels / Linux kernel / Computer security / Control-flow integrity / Kernel / System call / Protection ring / MINIX 3 / Microkernel
Date: 2016-06-13 11:08:40
Computer architecture
Software
Computing
Operating system kernels
Linux kernel
Computer security
Control-flow integrity
Kernel
System call
Protection ring
MINIX 3
Microkernel

Fine-Grained Control-Flow Integrity for Kernel Software Xinyang Ge∗ , Nirupama Talele∗ , Mathias Payer† , and Trent Jaeger∗ ∗ The Pennsylvania State University

Add to Reading List

Source URL: hexhive.github.io

Download Document from Source Website

File Size: 287,28 KB

Share Document on Facebook

Similar Documents

2013 IEEE Symposium on Security and Privacy  Practical Control Flow Integrity & Randomization for Binary Executables Chao Zhang1 , Tao Wei1,2∗ , Zhaofeng Chen1 , Lei Duan1 , L´aszl´o Szekeres2,3+ , Stephen McCamant2,

2013 IEEE Symposium on Security and Privacy Practical Control Flow Integrity & Randomization for Binary Executables Chao Zhang1 , Tao Wei1,2∗ , Zhaofeng Chen1 , Lei Duan1 , L´aszl´o Szekeres2,3+ , Stephen McCamant2,

DocID: 1vqO6 - View Document

ASLR: How Robust is the Randomness? Jonathan Ganz What is Address Space Layout Randomization? ● Provides System-Level Control-Flow Integrity

ASLR: How Robust is the Randomness? Jonathan Ganz What is Address Space Layout Randomization? ● Provides System-Level Control-Flow Integrity

DocID: 1uHp5 - View Document

CCFI: Cryptographically Enforced Control Flow Integrity Ali José Mashtizadeh Andrea Bittau  Dan Boneh

CCFI: Cryptographically Enforced Control Flow Integrity Ali José Mashtizadeh Andrea Bittau Dan Boneh

DocID: 1uvHe - View Document

Code-Pointer Integrity Volodymyr Kuznetsov, László Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song Control-Flow Hijack Attack Memory

Code-Pointer Integrity Volodymyr Kuznetsov, László Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song Control-Flow Hijack Attack Memory

DocID: 1utTo - View Document

A  Control-Flow Integrity: Precision, Security, and Performance Nathan Burow, Purdue University Scott A. Carr, Purdue University

A Control-Flow Integrity: Precision, Security, and Performance Nathan Burow, Purdue University Scott A. Carr, Purdue University

DocID: 1uq6n - View Document