Abstrakti
Stack canaries remain a widely deployed defense against memory corruption attacks. Despite their practical usefulness, canaries are vulnerable to memory disclosure and
brute-forcing attacks. We propose PCan, a new approach based on ARMv8.3-A pointer authentication (PA), that uses dynamically-generated canaries to mitigate these weaknesses and show that it provides more fine-grained protec-
tion with minimal performance overhead.
brute-forcing attacks. We propose PCan, a new approach based on ARMv8.3-A pointer authentication (PA), that uses dynamically-generated canaries to mitigate these weaknesses and show that it provides more fine-grained protec-
tion with minimal performance overhead.
Alkuperäiskieli | Englanti |
---|---|
Otsikko | SysTEX ’19, October 27, 2019, Huntsville, ON, Canada |
Kustantaja | ACM |
ISBN (elektroninen) | 978-1-4503-6888-9 |
DOI - pysyväislinkit | |
Tila | Julkaistu - 27 lokak. 2019 |
OKM-julkaisutyyppi | A4 Artikkeli konferenssijulkaisussa |
Tapahtuma | Workshop on System Software for Trusted Execution - Colocated with SOSP'19 October 27-30 2019, Huntsville, Ontario, Canada, Huntsville, Kanada Kesto: 27 lokak. 2019 → 27 lokak. 2019 https://systex.ibr.cs.tu-bs.de/systex19/ |
Workshop
Workshop | Workshop on System Software for Trusted Execution |
---|---|
Lyhennettä | SysTEX 2019 |
Maa/Alue | Kanada |
Kaupunki | Huntsville |
Ajanjakso | 27/10/2019 → 27/10/2019 |
www-osoite |