Statements (19)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:security_technique
|
| gptkbp:aimsTo |
prevent control-flow hijacking attacks
|
| gptkbp:appliesTo |
software security
|
| gptkbp:category |
computer security
software engineering |
| gptkbp:enforcedBy |
valid control flow transfers
|
| gptkbp:implementedIn |
gptkb:Microsoft_Visual_Studio
gptkb:LLVM |
| gptkbp:introduced |
gptkb:Microsoft_Research
|
| gptkbp:introducedIn |
2005
|
| gptkbp:mitigatedBy |
return-oriented programming
code reuse attacks jump-oriented programming |
| gptkbp:relatedTo |
control flow graph
|
| gptkbp:usedIn |
operating systems
compilers |
| gptkbp:bfsParent |
gptkb:Address_Space_Layout_Randomization
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
control flow integrity
|