首页> 外文期刊>ACM Computing Surveys >Control-Flow Integrity: Precision, Security, and Performance
【24h】

Control-Flow Integrity: Precision, Security, and Performance

机译:控制流完整性:精度,安全性和性能

获取原文
获取原文并翻译 | 示例

摘要

Memory corruption errors in C/C++ programs remain the most common source of security vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption vulnerabilities to divert program execution away from the intended control flow. Researchers have spent more than a decade studying and refining defenses based on Control- Flow Integrity (CFI); this technique is now integrated into several production compilers. However, so far, no study has systematically compared the various proposed CFI mechanisms nor is there any protocol on how to compare such mechanisms. We compare a broad range of CFI mechanisms using a unified nomenclature based on (i) a qualitative discussion of the conceptual security guarantees, (ii) a quantitative security evaluation, and (iii) an empirical evaluation of their performance in the same test environment. For each mechanism, we evaluate (i) protected types of control-flow transfers and (ii) precision of the protection for forward and backward edges. For open-source, compiler-based implementations, we also evaluate (iii) generated equivalence classes and target sets and (iv) runtime performance.
机译:C / C ++程序中的内存损坏错误仍然是当今系统中最常见的安全漏洞来源。控制流劫持攻击利用内存损坏漏洞将程序执行转移到预期的控制流之外。研究人员已经花费了十多年的时间来研究和完善基于控制流完整性(CFI)的防御技术。现在,该技术已集成到多个生产编译器中。但是,到目前为止,还没有研究系统地比较各种提议的CFI机制,也没有关于如何比较这种机制的协议。我们基于(i)概念性安全保证的定性讨论,(ii)定量安全性评估和(iii)在相同测试环境中对其性能的实证评估,使用统一的命名法比较了广泛的CFI机制。对于每种机制,我们评估(i)控制流传输的受保护类型,以及(ii)前向和后向边缘的保护精度。对于基于编译器的开源实现,我们还评估(iii)生成的等效类和目标集以及(iv)运行时性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号