Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

CFI-based defenses

biblio

Visible to the public CFI: Control Flow Integrity or Control Flow Interruption?

Submitted by aekwall on Mon, 02/24/2020 - 11:01am
  • return oriented programming
  • malicious code injection
  • modern Code Reuse Attacks
  • Monitoring
  • object-oriented programming
  • Payloads
  • programming
  • pubcrawl
  • Resiliency
  • Libraries
  • return-oriented programming
  • Runtime
  • runtime attacks
  • runtime memory vulnerabilities
  • Scalability
  • security of data
  • target system
  • rop attacks
  • Jump-Oriented Programming
  • interrupt requests
  • Human Factors
  • famous attack paradigms
  • execution flow
  • data flow analysis
  • data execution prevention
  • corrupt code pointers
  • control-flow integrity
  • Control Flow Integrity
  • computer security
  • composability
  • CFI-based defenses
  • CFI solutions
  • C++ languages

Terms of Use  |  ©2023. CPS-VO