| The Leakage-Resilience Dilemma | |
|---|---|
| Author | |
| Abstract |
Many control-flow-hijacking attacks rely on information leakage to disclose the location of gadgets. To address this, several leakage-resilient defenses, have been proposed that fundamentally limit the power of information leakage. Examples of such defenses include address-space re-randomization, destructive code reads, and execute-only code memory. Underlying all of these defenses is some form of code randomization.
|
| Year of Publication |
2019
|
| Conference Name |
24th European Symposium on Research in Computer Security
|
| Date Published |
09/2019
|
| Publisher |
Springer-Verlag
|
| Conference Location |
Berlin, Heidelberg
|
| ISBN Number |
978-3-030-29958-3
|
| URL |
https://doi.org/10.1007/978-3-030-29959-0_5
|
| DOI |
10.1007/978-3-030-29959-0_5
|
| Google Scholar | BibTeX | XML | DOI | |