Files
Abstract
Memory corruption is one of the oldest and most significant issues in computer security. To protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. CFI has three main components: the CFI policy, reference monitor, and control flow graph (CFG). However, the most advanced context-sensitive CFI policies fall short of protecting real-world programs that require cross-DSO (Dynamic Shared Object) support. Our research proposes a placeholder CFG design integrated and enforced through a trusted enclave utilizing Intel Software Guard Extensions (SGX) and leveraged static value-flow analysis (SVF) to compute a partial CFG. This unique approach aims to enhance the protection provided by CFI, particularly for programs with cross-DSO dependencies, by employing a secure enclave and a customized CFG construction method