Eliminating Control Flow Exploitation

Abstract: Many attacks rely on the ability of an adversary to manipulate the normal, expected flow of the legitimate software executing on a platform. This talk will summarize the mitigations NSA is developing with industry to address this attack vector at a fundamental level and in a way that is largely invisible to the end user and administrator.

Date Published:

Last Reviewed: 20 October 2016

Dissemination Control: N/A

Length: 33 page(s)

Format: pdf

Type: Reference/Overview; Presentation

Tags: IAS 2016; Information Assurance - IA; Information Technology - IT; Cyber; Cybersecurity; Network; Network Security; Defend