<--- Back to Details
First PageDocument Content
Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack
Date: 2017-05-14 00:24:54
Computer security
Computing
Compiler construction
Computer programming
Software engineering
Return-oriented programming
Control-flow integrity
Code reuse
Control flow graph
Program analysis
Data-flow analysis
Cyberattack

Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 327,47 KB

Share Document on Facebook

Similar Documents

2013 IEEE Symposium on Security and Privacy  Practical Control Flow Integrity & Randomization for Binary Executables Chao Zhang1 , Tao Wei1,2∗ , Zhaofeng Chen1 , Lei Duan1 , L´aszl´o Szekeres2,3+ , Stephen McCamant2,

2013 IEEE Symposium on Security and Privacy Practical Control Flow Integrity & Randomization for Binary Executables Chao Zhang1 , Tao Wei1,2∗ , Zhaofeng Chen1 , Lei Duan1 , L´aszl´o Szekeres2,3+ , Stephen McCamant2,

DocID: 1vqO6 - View Document

ASLR: How Robust is the Randomness? Jonathan Ganz What is Address Space Layout Randomization? ● Provides System-Level Control-Flow Integrity

ASLR: How Robust is the Randomness? Jonathan Ganz What is Address Space Layout Randomization? ● Provides System-Level Control-Flow Integrity

DocID: 1uHp5 - View Document

CCFI: Cryptographically Enforced Control Flow Integrity Ali José Mashtizadeh Andrea Bittau  Dan Boneh

CCFI: Cryptographically Enforced Control Flow Integrity Ali José Mashtizadeh Andrea Bittau Dan Boneh

DocID: 1uvHe - View Document

Code-Pointer Integrity Volodymyr Kuznetsov, László Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song Control-Flow Hijack Attack Memory

Code-Pointer Integrity Volodymyr Kuznetsov, László Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song Control-Flow Hijack Attack Memory

DocID: 1utTo - View Document

A  Control-Flow Integrity: Precision, Security, and Performance Nathan Burow, Purdue University Scott A. Carr, Purdue University

A Control-Flow Integrity: Precision, Security, and Performance Nathan Burow, Purdue University Scott A. Carr, Purdue University

DocID: 1uq6n - View Document