Abstract
Shadow stacks are the go-to solution for perfect backward-edge control-flow integrity (CFI). Software shadow stacks trade off security for performance. Hardware-assisted shadow stacks are efficient and secure, but expensive to deploy. We present authenticated call stack (ACS), a novel mechanism for precise verification of return addresses using aggregated message authentication codes. We show how ACS can be realized using ARMv8.3-A pointer authentication, a new low-overhead mechanism for protecting pointer integrity. Our solution achieves security comparable to hardware-assisted shadow stacks, while incurring negligible performance overhead (< 0.5%) but requiring no additional hardware support.
Original language | English |
---|---|
Title of host publication | Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019 |
Publisher | ACM |
Number of pages | 2 |
ISBN (Electronic) | 978-1-4503-6725-7 |
ISBN (Print) | 978-1-7281-2426-1 |
DOIs | |
Publication status | Published - 2 Jun 2019 |
MoE publication type | A4 Article in a conference publication |
Event | Annual Design Automation Conference - Las Vegas, United States Duration: 2 Jun 2019 → 6 Jun 2019 Conference number: 56 |
Publication series
Name | Proceedings - Design Automation Conference |
---|---|
ISSN (Print) | 0738-100X |
Conference
Conference | Annual Design Automation Conference |
---|---|
Abbreviated title | DAC |
Country/Territory | United States |
City | Las Vegas |
Period | 02/06/2019 → 06/06/2019 |