gptkbp:instanceOf
|
Security technique
|
gptkbp:abbreviation
|
gptkb:CFI
|
gptkbp:appliesTo
|
gptkb:software
Operating systems
Compilers
|
gptkbp:category
|
Software security
Exploit mitigation
|
gptkbp:field
|
Computer security
|
https://www.w3.org/2000/01/rdf-schema#label
|
Control Flow Integrity
|
gptkbp:implementedIn
|
gptkb:GCC
gptkb:Microsoft_Visual_Studio
gptkb:LLVM
|
gptkbp:introduced
|
gptkb:Microsoft_Research
|
gptkbp:introducedIn
|
2005
|
gptkbp:limitation
|
Performance overhead
Bypass techniques exist
|
gptkbp:mechanismOfAction
|
Checks indirect branches
Enforces valid control-flow transfers
Restricts jump targets
|
gptkbp:protectedBy
|
Buffer overflow attacks
Code injection
Return-to-libc attacks
|
gptkbp:purpose
|
Prevent control-flow hijacking attacks
|
gptkbp:relatedStandard
|
CET (Control-flow Enforcement Technology)
|
gptkbp:relatedTo
|
gptkb:Return-oriented_programming
gptkb:Intel_CET
Code-reuse attacks
Control-flow graph
Shadow stack
|
gptkbp:standardizedBy
|
C2M2
|
gptkbp:bfsParent
|
gptkb:ARM_Pointer_Authentication
gptkb:Shadow_Stack
gptkb:ShadowCallStack
|
gptkbp:bfsLayer
|
7
|