Binary and Malware Analysis

Table of Contents

Mitigating code-reuse attacks at the binary level

Control-flow integrity:

A call to function pointer gives you an attacker-controlled gadget, especially if it’s in a loop.

The idea of TypeArmor: