进程控制流完整性保护技术综述

Translated title of the contribution: Survey on Control-flow Integrity Techniques

Zheng Zhang, Jing Feng Xue, Jing Ci Zhang, Tian Chen, Yu An Tan, Yuan Zhang Li, Quan Xin Zhang

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Control-flow hijacking attacks exploit memory corruption vulnerabilities to grab control of the program, and then hijack the program to execute malicious code, which brings a great threat to system security. In order to prevent control-flow hijacking attacks, researchers have presented a series of defense methods. Control-flow integrity is a runtime defense method that prevents illegal transfer of process control-flow to ensure that control-flow is always within the range required by the program. In recent years, more and more research works are devoted to solving related problems of control-flow integrity, such as presenting new control-flow integrity schemes, new control-flow integrity scheme evaluation methods, etc. This study explains the basic principles of control flow integrity, and then classifies existing control flow integrity schemes. The existing evaluation methods and evaluation indicators of the control-flow integrity scheme are introduced at the same time. Finally, the thoughts on potential future work on control-flow integrity is summarized, which, hopefully, will provide an outlook of the research direction in the future.

Translated title of the contributionSurvey on Control-flow Integrity Techniques
Original languageChinese (Traditional)
Pages (from-to)489-508
Number of pages20
JournalRuan Jian Xue Bao/Journal of Software
Volume34
Issue number1
DOIs
Publication statusPublished - Jan 2023

Fingerprint

Dive into the research topics of 'Survey on Control-flow Integrity Techniques'. Together they form a unique fingerprint.

Cite this