enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Control-flow integrity - Wikipedia

    en.wikipedia.org/wiki/Control-flow_integrity

    Control-flow integrity. Control-flow integrity (CFI) is a general term for computer security techniques that prevent a wide variety of malware attacks from redirecting the flow of execution (the control flow) of a program.

  3. Control flow - Wikipedia

    en.wikipedia.org/wiki/Control_flow

    Control flow. v. t. e. In computer science, control flow (or flow of control) is the order in which individual statements, instructions or function calls of an imperative program are executed or evaluated. The emphasis on explicit control flow distinguishes an imperative programming language from a declarative programming language.

  4. Return-oriented programming - Wikipedia

    en.wikipedia.org/wiki/Return-oriented_programming

    Return-oriented programming is an advanced version of a stack smashing attack. Generally, these types of attacks arise when an adversary manipulates the call stack by taking advantage of a bug in the program, often a buffer overrun. In a buffer overrun, a function that does not perform proper bounds checking before storing user-provided data ...

  5. Indirect branch tracking - Wikipedia

    en.wikipedia.org/wiki/Indirect_Branch_Tracking

    Indirect branch tracking (IBT), also known as branch target identification (BTI), is a control flow integrity mechanism implemented on some Intel x86-64 and ARM-64 processors. IBT is designed to protect against computer security exploits that use indirect branch instructions to jump into code in unintended ways, such as return-oriented programming.

  6. Blind return-oriented programming - Wikipedia

    en.wikipedia.org/wiki/Blind_return-oriented...

    This slows down the attack considerably and allows the system administrator to look into any suspicious activity. Apart from this the conventional protection against ROP style control flow hijacking attacks, Control Flow Integrity also can provide provable prevention but at a significant performance overhead.

  7. Buffer overflow protection - Wikipedia

    en.wikipedia.org/wiki/Buffer_overflow_protection

    Canaries or canary words or stack cookies are known values that are placed between a buffer and control data on the stack to monitor buffer overflows. When the buffer overflows, the first data to be corrupted will usually be the canary, and a failed verification of the canary data will therefore alert of an overflow, which can then be handled, for example, by invalidating the corrupted data.

  8. Category:Control flow integrity - Wikipedia

    en.wikipedia.org/.../Category:Control_flow_integrity

    Pages in category "Control flow integrity" The following 3 pages are in this category, out of 3 total. This list may not reflect recent changes. * Control-flow ...

  9. Shadow stack - Wikipedia

    en.wikipedia.org/wiki/Shadow_stack

    Shadow stack. In computer security, a shadow stack is a mechanism for protecting a procedure 's stored return address, [1] such as from a stack buffer overflow. The shadow stack itself is a second, separate stack that "shadows" the program call stack. In the function prologue, a function stores its return address to both the call stack and the ...