Overview
- Provides deep understanding of Control-Flow Integrity
- Offers new insights on the relationship between function signature and compiler optimization
- Demonstrates how CFI can be more efficient than Data Execution Prevention
Part of the book series: Information Security and Cryptography (ISC)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (6 chapters)
Keywords
About this book
In this book, we propose novel solutions to handle these three fundamental components.To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and heuristic-based mechanism to more accurately recover function signature. To embed CFI policy securely, we design a novel platform which encodes the policy into the machine instructions directly without relying on consulting any read-only data structure, by making use of the idea of instruction-set randomization. Each basic block is encrypted with a key derived from the CFG. To efficiently enforce CFI policy, we make use of a mature dynamic code optimization platform called DynamoRIO to enforce the policy so that we are only required to do the CFI check when needed.
Authors and Affiliations
About the author
Bibliographic Information
Book Title: Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
Authors: Yan Lin
Series Title: Information Security and Cryptography
DOI: https://doi.org/10.1007/978-3-030-73141-0
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
Softcover ISBN: 978-3-030-73140-3Published: 01 May 2021
eBook ISBN: 978-3-030-73141-0Published: 30 April 2021
Series ISSN: 1619-7100
Series E-ISSN: 2197-845X
Edition Number: 1
Number of Pages: XIII, 95
Number of Illustrations: 23 b/w illustrations
Topics: Systems and Data Security, Data Structures and Information Theory, Programming Techniques, Programming Languages, Compilers, Interpreters, Continuous Optimization