A CFI Countermeasure Against GOT Overwrite Attacks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

Countermeasure for collusion attacks against digital watermarking

Customer identification watermarking today is one of the most promising application domains of digital watermarking. It enables to identify individual copies of otherwise indistinguishable digital copies. If done without any precautions, those individual watermarking are vulnerable to a number of specialized attacks based on an attacker collecting more than one individual copy. Fingerprinting a...

متن کامل

Leakage Squeezing Countermeasure against High-Order Attacks

In the recent years, side channel attacks have been widely investigated. In particular, second order attacks (2O-attacks) have been improved and successfully applied to break many masked implementations. In this context we propose a new concept to hinder attacks of all order: instead of injecting more entropy, we make the most of a single-mask entropy. With specially crafted bijections instanti...

متن کامل

Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks

Power Analysis attacks on elliptic curve cryptosystems and various countermeasures against them, have been first discussed by Coron ([6]). All proposed countermeasures are based on the randomization or blinding of the inputparameters of the binary algorithm. We propose a countermeasure that randomizes the binary algorithm itself. Our algorithm needs approximately 9% more additions than the ordi...

متن کامل

Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks

:H LQWURGXFH D FU\SWRJUDSKLFDOO\ EDVHG FRXQWHUPHD VXUH DJDLQVW FRQQHFWLRQ GHSOHWLRQ DWWDFNV &RQQHFWLRQ GHSOHWLRQ LV D GHQLDO RI VHUYLFH DWWDFN LQ ZKLFK DQ DW WDFNHU VHHNV WR LQLWLDWH DQG OHDYH XQUHVROYHG D ODUJH QXPEHU RI FRQQHFWLRQ UHTXHVWV WR D VHUYHU H[KDXVWLQJ LWV UHVRXUFHV DQG UHQGHULQJ LW LQFDSDEOH RI VHUYLFLQJ OH JLWLPDWH UHTXHVWV 7&3 6<1 qRRGLQJ LV D ZHOO NQRZQ H[DPSOH RI VXFK DQ DWWDFN...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.2975037