Главная
Study mode:
on
1
Intro
2
Control-flow attack is getting harder
3
Control-flow attack is still possible
4
Example: control-flow attack
5
Example: control-flow integrity
6
Unique code target property
7
Challenges with Intel PT
8
Which data is necessary?
9
UCFI - perform efficient analysis path reconstruction from PT trace is slow!
10
Implementation
11
Security - enforcing unique target
12
Security - preventing attacks
13
Efficiency - performance overhead
14
Efficiency - memory&code overhead
15
Efficiency - trace size reduction
16
Discussion - backward-edge CFI
17
Conclusion: UCFI
18
Discussion - difference from CPI
Description:
Explore a comprehensive analysis of control-flow integrity (CFI) and its implementation challenges in this 24-minute conference talk. Delve into the concept of unique code target property and its potential to enhance CFI effectiveness. Examine the limitations of existing CFI approaches and understand why they fall short in preventing control-hijacking attacks. Learn about the innovative UCFI (Unique Code Target Property for Control-Flow Integrity) method, its implementation, security benefits, and efficiency considerations. Investigate the use of Intel PT for efficient analysis and path reconstruction. Discuss backward-edge CFI and compare UCFI with other techniques like CPI. Gain valuable insights into advancing cybersecurity measures against sophisticated control-flow attacks.

Enforcing Unique Code Target Property for Control-Flow Integrity

Association for Computing Machinery (ACM)
Add to list