Statements (19)
Predicate | Object |
---|---|
gptkbp:instanceOf |
security technique
|
gptkbp:aimsTo |
prevent control-flow hijacking attacks
|
gptkbp:appliesTo |
software security
|
gptkbp:category |
computer security
software engineering |
gptkbp:enforcedBy |
valid control flow transfers
|
https://www.w3.org/2000/01/rdf-schema#label |
control flow integrity
|
gptkbp:implementedIn |
gptkb:Microsoft_Visual_Studio
gptkb:LLVM |
gptkbp:introduced |
gptkb:Microsoft_Research
|
gptkbp:introducedIn |
2005
|
gptkbp:mitigatedBy |
return-oriented programming
code reuse attacks jump-oriented programming |
gptkbp:relatedTo |
control flow graph
|
gptkbp:usedIn |
operating systems
compilers |
gptkbp:bfsParent |
gptkb:Address_Space_Layout_Randomization
|
gptkbp:bfsLayer |
7
|