Towards a Policy-Agnostic Control-Flow Integrity Implementation

Towards a Policy-Agnostic Control-Flow Integrity Implementation

Black Hat via YouTube Direct link

Outline

2 of 29

2 of 29

Outline

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Towards a Policy-Agnostic Control-Flow Integrity Implementation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Outline
  3. 3 Motivation
  4. 4 Color Reuse Attack
  5. 5 Summary
  6. 6 Background
  7. 7 ReturnOriented Programming
  8. 8 Thread Model
  9. 9 Randomization
  10. 10 Requirements
  11. 11 Basics
  12. 12 Dynamic Points to Analysis
  13. 13 Dereferencing Memory
  14. 14 Direct Code pointers
  15. 15 Static instrumentation
  16. 16 Coarsegrained CFI
  17. 17 Coop CFI
  18. 18 Return CFI
  19. 19 Shadow Stack Policy
  20. 20 Return Policy
  21. 21 Interfacing with Hardware
  22. 22 Why Hardware
  23. 23 Scheduling Issues
  24. 24 Shadow Stack
  25. 25 Process Control Block
  26. 26 Underflow
  27. 27 CFI Fault
  28. 28 HDFI
  29. 29 ACF

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.