<div dir="ltr">Take a look at <div><br></div><div><a href="http://clang.llvm.org/docs/ControlFlowIntegrityDesign.html">clang.llvm.org/docs/ControlFlowIntegrityDesign.html</a><br></div><div><a href="http://clang.llvm.org/docs/ControlFlowIntegrity.html">clang.llvm.org/docs/ControlFlowIntegrity.html</a><br></div><div><br></div><div>And the tests: <a href="https://github.com/llvm-mirror/compiler-rt/tree/master/test/cfi">https://github.com/llvm-mirror/compiler-rt/tree/master/test/cfi</a></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Mon, Aug 31, 2015 at 7:43 PM, 慕冬亮 via llvm-dev <span dir="ltr"><<a href="mailto:llvm-dev@lists.llvm.org" target="_blank">llvm-dev@lists.llvm.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">I want to create an experiment to show the effectiveness of cfi : <div>For example , </div><div>I first need a program with vulnerability so that we can hijack its control flow;</div><div><br></div><div>then I enforce cfi of llvm and we can't hijack its control flow.</div><div><br></div><div>Do you have any advice for me?</div><div>    </div><div>    - mudongliang</div><div><br></div><div><br><div><br><div><br></div></div></div></div>
<br>_______________________________________________<br>
LLVM Developers mailing list<br>
<a href="mailto:llvm-dev@lists.llvm.org">llvm-dev@lists.llvm.org</a><br>
<a href="http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev" rel="noreferrer" target="_blank">http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev</a><br>
<br></blockquote></div><br></div>