control-flow integrity

Protecting RISC V Processors against Physical Attacks

A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level

How to Survive the Hardware Assisted Control Flow Integrity Enforcement

USENIX Enigma 2016 - Sanitize, Fuzz, and Harden Your C++ Code

Area41 2016: Matthias Ganz: ROP mitigations and Control Flow Guard - the end of code reuse attacks?

Back To The Epilogue: How to Evade Windows' Control Flow Guard with Less than 16 Bytes

Control Flow Integrity on RISC-V Linux - Deepak Gupta, Rivos Inc

RISC-V Control-Flow Integrity (CFI) - Ved Shanbhogue, Rivos & George Christou

The Beast is in Your Memory

USENIX Security '24 - Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis

Wonks 03/30/2018 - Control Flow Integrity, Metacircular evaluator with JIT

Anthony Zgheib - Enhancing the RISC-V Trace Encoder to Verify the Control-Flow and More

Lecture 8 - Control flow Integrity - Part 2

Lecture 10 - Lightweight in process isolation using Intel, Memory Protection Keys(MPK)

Kito Cheng: Hardware control-flow Integrity for RISC-V - GNU Tools Cauldron 2024

Hardware Based Software Control Flow Integrity Review on the State of the Art Implementation Technol

The Power of Data-Oriented Attacks

dynamic study of simultaneous underflow

USENIX ATC '22 - Hardening Hypervisors with Ombro

2018-03-07 CERIAS - CFIXX -- Object Type Integrity for C++

2017-03-29 CERIAS - DataShield: Configurable Data Confidentiality and Integrity

NDSS 2022 CFInsight: A Comprehensive Metric for CFI Policies

USENIX Security '21 - PACStack: an Authenticated Call Stack