Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks
ACSAC, pp. 309-318, 2012.
Code-reuse attacks by corrupting memory address pointers have been a major threat of software for many years. There have been numerous defenses proposed for countering this threat, but majority of them impose strict restrictions on software deployment such as requiring recompilation with a custom compiler, or causing integrity problems du...More
Full Text (Upload PDF)
PPT (Upload PPT)