Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Shining Light on Shadow Stacks

IEEE via YouTube

Overview

Explore the comprehensive analysis of shadow stack mechanisms for protecting against control-flow hijacking attacks in C/C++ programs. Delve into the performance, compatibility, and security aspects of various shadow stack designs presented at the 2019 IEEE Symposium on Security & Privacy. Learn about the proposed Shadesmar design, which leverages a dedicated register for improved performance and minimal memory overhead. Examine case studies demonstrating the feasibility of dedicating a general-purpose register to security monitoring on modern architectures. Gain insights into the potential of Intel x86 extensions for memory protection and page table control in enhancing intra-process memory isolation. Understand the design requirements for dedicated hardware mechanisms supporting precise software security mitigations and their implications for future cybersecurity efforts.

Syllabus

Intro
Backward Edge Pointer
State of CFI Mitigation
Shadow Stacks
Control Flow Hijacking
What is a Shadow Stack
Shadow Stack Advantages
Shadow Stack Design
Recommended Shadow Stack
General Purpose Register
Compatibility
Integrity Protection
Integrity Enforcement
Performance Evaluation
Conclusion

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Shining Light on Shadow Stacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.