Activities per year
Abstract
A popular run-time attack technique is to compromise the control-flow integrity of a program by modifying function return addresses on the stack. So far, shadow stacks have proven to be essential for comprehensively preventing return address manipulation. Shadow stacks record return addresses in integrity-protected memory secured with hardware-assistance or software access control. Software shadow stacks incur high overheads or trade off security for efficiency. Hardware-assisted shadow stacks are efficient and secure, but require the deployment of special-purpose hardware.
We present authenticated call stack (ACS), an approach that uses chained message authentication codes (MACs). Our prototype, PACStack, uses the ARM general purpose hardware mechanism for pointer authentication (PA) to implement ACS. Via a rigorous security analysis, we show that PACStack achieves security comparable to hardware-assisted shadow stacks without requiring dedicated hardware. We demonstrate that PACStack's performance overhead is small (~3%).
We present authenticated call stack (ACS), an approach that uses chained message authentication codes (MACs). Our prototype, PACStack, uses the ARM general purpose hardware mechanism for pointer authentication (PA) to implement ACS. Via a rigorous security analysis, we show that PACStack achieves security comparable to hardware-assisted shadow stacks without requiring dedicated hardware. We demonstrate that PACStack's performance overhead is small (~3%).
Original language | English |
---|---|
Title of host publication | Proceedings of the 30th USENIX Security Symposium |
Publisher | USENIX -The Advanced Computing Systems Association |
Number of pages | 18 |
ISBN (Electronic) | 978-1-939133-24-3 |
Publication status | Published - Aug 2020 |
MoE publication type | A4 Conference publication |
Event | USENIX Security Symposium - Virtual, Online Duration: 11 Aug 2021 → 13 Aug 2021 Conference number: 30 |
Conference
Conference | USENIX Security Symposium |
---|---|
Abbreviated title | USENIX |
City | Virtual, Online |
Period | 11/08/2021 → 13/08/2021 |
Fingerprint
Dive into the research topics of 'PACStack: an Authenticated Call Stack'. Together they form a unique fingerprint.Equipment
Activities
- 1 Invited academic talk
-
Design Across Layers: Achieving More by Joining Hardware, Software, and Cryptography
Gunn, L. (Speaker)
11 Sept 2023Activity: Talk or presentation types › Invited academic talk
File