SoK: Shining Light on Shadow Stacks Article Swipe
Related Concepts
Nathan Burow
,
Xinping Zhang
,
Mathias Payer
·
YOU?
·
· 2019
· Open Access
·
· DOI: https://doi.org/10.1109/sp.2019.00076
· OA: W2899759798
YOU?
·
· 2019
· Open Access
·
· DOI: https://doi.org/10.1109/sp.2019.00076
· OA: W2899759798
Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the forward edge, i.e., indirect calls through function pointers and virtual calls. Protecting the backward edge is left to stack canaries, which are easily bypassed through information leaks. Shadow Stacks are a fully precise mechanism for protecting backwards edges, and should be deployed with CFI mitigations.
Related Topics
Finding more related topics…