Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Protecting the Stack with Metadata Policies and Tagged Hardware

IEEE via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course aims to teach learners how to protect the program call stack from security vulnerabilities using metadata-tag based policies on a tagged architecture. The course covers topics such as stack protection policies, object-level protection, memory safety enforcement, and data-flow integrity. The teaching method involves discussing stack threat taxonomy, presenting policies with performance overhead analysis, and providing a summary of the key concepts. This course is intended for individuals interested in low-level programming languages, software security, and system architecture.

Syllabus

Intro
Overview
The call stack
Stack example
Slack attacks
What if the stack was labeled?
Tagged architecture (the PUMP)
Checking a stack access
What else do we need?
Largest cost: tagging stack memory
What if we're lazy?
Laziness results
Summary

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Protecting the Stack with Metadata Policies and Tagged Hardware

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.