1 / 6

MITIGATING CODE-REUSE ATTACKS WITH CONTROL-FLOWING LOCKING

MITIGATING CODE-REUSE ATTACKS WITH CONTROL-FLOWING LOCKING. AUTHORS : TYLER BLETSCH XUXIAN JIANG VINCE FREEH. Code-reuse attacks are software exploits in which an attacker directs control flow through existing code with a malicious result. Solution – Control Flow Locking. Summary.

donnel
Download Presentation

MITIGATING CODE-REUSE ATTACKS WITH CONTROL-FLOWING LOCKING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MITIGATING CODE-REUSE ATTACKS WITH CONTROL-FLOWING LOCKING AUTHORS: TYLER BLETSCH XUXIAN JIANG VINCE FREEH Vishal Naidu

  2. Code-reuse attacks are software exploits in which an attacker directs control flow through existing code with a malicious result. Solution – Control Flow Locking Summary Vishal Naidu

  3. Control Flow Locking enforces control flow integrity effectively mitigates the threat of code-reuse attacks at a reasonableperformance overhead. Appreciative Comment! Vishal Naidu

  4. The threat model does not state that the values of ‘value’ of ‘k’ are pre set or modified rather than the corresponding lock and unlock functions. Lock(value): if(k!=0) abort(); k=value; Unlock(value): if(k!=value) abort(); k=0; Critique! Vishal Naidu

  5. How small does the performance penalty have to be to be in order to deploy control flow locking in a real world scenario? Question? Vishal Naidu

  6. THANK YOU! Vishal Naidu

More Related