进程控制流完整性保护技术综述

Zheng Zhang, Jing Feng Xue, Jing Ci Zhang, Tian Chen, Yu An Tan, Yuan Zhang Li, Quan Xin Zhang

科研成果: 期刊稿件文章同行评审

2 引用 (Scopus)

摘要

Control-flow hijacking attacks exploit memory corruption vulnerabilities to grab control of the program, and then hijack the program to execute malicious code, which brings a great threat to system security. In order to prevent control-flow hijacking attacks, researchers have presented a series of defense methods. Control-flow integrity is a runtime defense method that prevents illegal transfer of process control-flow to ensure that control-flow is always within the range required by the program. In recent years, more and more research works are devoted to solving related problems of control-flow integrity, such as presenting new control-flow integrity schemes, new control-flow integrity scheme evaluation methods, etc. This study explains the basic principles of control flow integrity, and then classifies existing control flow integrity schemes. The existing evaluation methods and evaluation indicators of the control-flow integrity scheme are introduced at the same time. Finally, the thoughts on potential future work on control-flow integrity is summarized, which, hopefully, will provide an outlook of the research direction in the future.

投稿的翻译标题Survey on Control-flow Integrity Techniques
源语言繁体中文
页(从-至)489-508
页数20
期刊Ruan Jian Xue Bao/Journal of Software
34
1
DOI
出版状态已出版 - 1月 2023

关键词

  • control flow hijacking
  • control flow integrity
  • control-flow graph
  • system security

指纹

探究 '进程控制流完整性保护技术综述' 的科研主题。它们共同构成独一无二的指纹。

引用此