Original paper
Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection
Pages: 401 - 416
Published: Aug 20, 2014
Abstract
Return-oriented programming (ROP) offers a robust attack technique that has, not surprisingly, been extensively used to exploit bugs in modern software programs (e.g., web browsers and PDF readers). ROP attacks require no code injection, and have already been shown to be powerful enough to bypass fine-grained memory randomization (ASLR) defenses. To counter this ingenious attack strategy, several proposals for enforcement of (coarse-grained)...
Paper Details
Title
Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection
Published Date
Aug 20, 2014
Pages
401 - 416
Citation AnalysisPro
You’ll need to upgrade your plan to Pro
Looking to understand the true influence of a researcher’s work across journals & affiliations?
- Scinapse’s Top 10 Citation Journals & Affiliations graph reveals the quality and authenticity of citations received by a paper.
- Discover whether citations have been inflated due to self-citations, or if citations include institutional bias.
Notes
History