TY - JOUR AU - Sadeghi, Ahmad-Reza AB - Session K4: Secure Enclaves CCS ™17, October 30-November 3, 2017, Dallas, TX, USA JITGuard: Hardening Just-in-time Compilers with SGX Tommaso Frassetto David Gens CYSEC/Technische Universit t Darmstadt tommaso.frassetto@trust.tu-darmstadt.de CYSEC/Technische Universit t Darmstadt david.gens@trust.tu-darmstadt.de Christopher Liebchen Ahmad-Reza Sadeghi CYSEC/Technische Universit t Darmstadt christopher.liebchen@trust.tu-darmstadt.de CYSEC/Technische Universit t Darmstadt ahmad.sadeghi@trust.tu-darmstadt.de ABSTRACT website creators to dynamically change the content of the current web page without requesting a new website from the web server. For efficient execution modern run-time environments include justin-time (JIT) compilers to compile JavaScript programs into native code. Code-injection/reuse. Unfortunately, the run-time environment and the application that embeds dynamic languages often suffer from memory-corruption vulnerabilities due to massive usage of unsafe languages such as C and C++ that are still popular for compatibility and performance reasons. Attackers exploit memory-corruption vulnerabilities to access memory (unintended by the programmer), corrupt code and data structures, and take control over the targeted software to perform arbitrary malicious actions. Typically, attackers corrupt code pointers to hijack the control flow of the code, and to conduct code-injection [2] or code-reuse [45] attacks. While code injection attacks have become less appealing, mainly due to the introduction of Data Execution Prevention (DEP) or writable xor executable memory (W TI - JITGuard: Hardening Just-in-time Compilers with SGX DA - 2017-10-30 UR - https://www.deepdyve.com/lp/association-for-computing-machinery/jitguard-hardening-just-in-time-compilers-with-sgx-1M8LeISUCs DP - DeepDyve ER -