Hybrid Indirect Branch Predictors

2001 ◽  
pp. 125-164
Author(s):  
Karel Driesen
Keyword(s):  
2009 ◽  
Vol 31 (11) ◽  
pp. 1898-1906
Author(s):  
Nan YUAN ◽  
Dong-Rui FAN

2009 ◽  
Vol 33 (7-8) ◽  
pp. 461-468 ◽  
Author(s):  
Gyungho Lee ◽  
Yixin Shi ◽  
Hui Lin
Keyword(s):  

2019 ◽  
Vol 9 (20) ◽  
pp. 4229 ◽  
Author(s):  
Sarwar Sayeed ◽  
Hector Marco-Gisbert ◽  
Ismael Ripoll ◽  
Miriam Birch

Despite the intense efforts to prevent programmers from writing code with memory errors, memory corruption vulnerabilities are still a major security threat. Consequently, control-flow integrity has received significant attention in the research community, and software developers to combat control code execution attacks in the presence of type of faults. Control-flow Integrity (CFI) is a large family of techniques that aims to eradicate memory error exploitation by ensuring that the instruction pointer (IP) of a running process cannot be controlled by a malicious attacker. In this paper, we assess the effectiveness of 14 CFI techniques against the most popular exploitation techniques, including code reuse attacks, return-to-user, return-to-libc, and replay attacks. We also classify these techniques based on their security, robustness, and implementation complexity. Our study indicates that the majority of the CFI techniques are primarily focused on restricting indirect branch instructions and cannot prevent all forms of vulnerability exploitation. We conclude that the performance overhead introduced, jointly with the partial attack coverage, is discouraging the industry from adopting most of them.


Author(s):  
Muhammad Umar Farooq ◽  
Lei Chen ◽  
Lizy Kurian John

Author(s):  
Jason D. Hiser ◽  
Daniel Williams ◽  
Wei Hu ◽  
Jack W. Davidson ◽  
Jason Mars ◽  
...  

1998 ◽  
Vol 26 (3) ◽  
pp. 167-178 ◽  
Author(s):  
Karel Driesen ◽  
Urs Hölzle

2014 ◽  
Vol 29 (6) ◽  
pp. 929-946
Author(s):  
Zi-Chao Xie ◽  
Dong Tong ◽  
Ming-Kai Huang

Sign in / Sign up

Export Citation Format

Share Document