Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2022
Practical Software-Based Shadow Stacks on x86-64
ACM Transactions on Architecture and Code Optimization (TACO), Volume 19, Issue 4Article No.: 61, Pages 1–26https://doi.org/10.1145/3556977Control-Flow Integrity (CFI) techniques focus often on protecting forward edges and assume that backward edges are protected by shadow stacks. However, software-based shadow stacks that can provide performance, security, and compatibility are still hard ...
- research-articleMarch 2022
Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 31, Issue 2Article No.: 35e, Pages 1–37https://doi.org/10.1145/3494516Shadow stacks play an important role in protecting return addresses to mitigate ROP attacks. Parallel shadow stacks, which shadow the call stack of each thread at the same constant offset for all threads, are known not to support multi-threading well. On ...