Displaying 1 result from an estimated 1 matches for "sstic2015".
2015 Sep 01
5
llvm cfi
I want to create an experiment to show the effectiveness of cfi :
For example ,
I first need a program with vulnerability so that we can hijack its control
flow;
then I enforce cfi of llvm and we can't hijack its control flow.
Do you have any advice for me?
- mudongliang
-------------- next part --------------
An HTML attachment was scrubbed...
URL: