A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber
-
Updated
May 10, 2017 - C
A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber
Access Arm64 CPU system registers
Sample programs that illustrate how to use control flow integrity with the clang compiler
Security Evaluation of Dynamic Binary Instrumentation Engines
Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024
Sample programs that illustrate how to use Control Flow Guard, VS2015's control flow integrity implementation
Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019
Windbg extension that allows you analyze Control Flow Guard map
Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19
VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advanced security protections like Intel CET and Control-Flow Guard (CFG) to achieve Remote Code Execution.
Prototype code and helpers for the Zero-Knowledge Control-Flow Attestation (ZEKRA) protocol
A toolchain for software integrity protection including self-checksumming, control flow integrity, result checking, oblivious hashing and a sample program protected using Intel SGX
A collection of simple JavaScript exercises demonstrating conditional structures, logical operators, and arithmetic expressions.
Software based Side Channel attacks
Add a description, image, and links to the control-flow-integrity topic page so that developers can more easily learn about it.
To associate your repository with the control-flow-integrity topic, visit your repo's landing page and select "manage topics."