A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber
-
Updated
May 10, 2017 - C
A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber
Sample programs that illustrate how to use control flow integrity with the clang compiler
Security Evaluation of Dynamic Binary Instrumentation Engines
Sample programs that illustrate how to use Control Flow Guard, VS2015's control flow integrity implementation
Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019
Windbg extension that allows you analyze Control Flow Guard map
Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024
Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19
A toolchain for software integrity protection including self-checksumming, control flow integrity, result checking, oblivious hashing and a sample program protected using Intel SGX
Prototype code and helpers for the Zero-Knowledge Control-Flow Attestation (ZEKRA) protocol
A VFGadget finder script to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advanced security protections like CET and CFG.
Software based Side Channel attacks
Add a description, image, and links to the control-flow-integrity topic page so that developers can more easily learn about it.
To associate your repository with the control-flow-integrity topic, visit your repo's landing page and select "manage topics."