Control Flow Integrity

GPTKB entity

Statements (34)
Predicate Object
gptkbp:instanceOf Security technique
gptkbp:abbreviation gptkb:CFI
gptkbp:appliesTo gptkb:software
Operating systems
Compilers
gptkbp:category Software security
Exploit mitigation
gptkbp:field Computer security
https://www.w3.org/2000/01/rdf-schema#label Control Flow Integrity
gptkbp:implementedIn gptkb:GCC
gptkb:Microsoft_Visual_Studio
gptkb:LLVM
gptkbp:introduced gptkb:Microsoft_Research
gptkbp:introducedIn 2005
gptkbp:limitation Performance overhead
Bypass techniques exist
gptkbp:mechanismOfAction Checks indirect branches
Enforces valid control-flow transfers
Restricts jump targets
gptkbp:protectedBy Buffer overflow attacks
Code injection
Return-to-libc attacks
gptkbp:purpose Prevent control-flow hijacking attacks
gptkbp:relatedStandard CET (Control-flow Enforcement Technology)
gptkbp:relatedTo gptkb:Return-oriented_programming
gptkb:Intel_CET
Code-reuse attacks
Control-flow graph
Shadow stack
gptkbp:standardizedBy C2M2
gptkbp:bfsParent gptkb:ARM_Pointer_Authentication
gptkb:Shadow_Stack
gptkb:ShadowCallStack
gptkbp:bfsLayer 7