Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,121,586 papers from all fields of science
Search
Sign In
Create Free Account
Shadow stack
In software, a shadow stack is a mechanism for maintaining control-flow integrity by mitigating return address overwrites such as those seen during…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Call stack
Compiler
Control-flow integrity
Exploit (computer security)
Expand
Broader (2)
Computer security
Memory management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Making Code Re-randomization Practical with MARDU
Christopher Jelesnianski
,
Jinwoo Yom
,
Changwoo Min
,
Yeongjin Jang
arXiv.org
2019
Corpus ID: 202712782
Defense techniques such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) were the early role…
Expand
2017
2017
Rest in Protection - A Kernel-level Approach to Mitigate RIP Tampering
Vincent Haupert
,
Tilo Müller
International Conference on Information Systems…
2017
Corpus ID: 46043315
We present RIProtection (Rest In Protection), a novel Linux kernel-based approach that mitigates the tampering of return…
Expand
2007
2007
Method for realizing shadow stack memory on picture and circuit thereof
时龙兴
,
陆生礼
2007
Corpus ID: 149772896
本发明公开了一种实现片上影子堆栈存储器的方法及其电路,涉及微处理器内部堆栈操作方法和存储电路。 包括片上影子堆栈存储器,配置寄存器,片选电路,地址比较电路,地址译码电路,存储控制器,片外存储器等。 采用动态配置的方法,将在片外存储器中高频率访问的堆栈段单元的数据映射到片上影子堆栈存储器中,在微处理器进行堆栈操作时,访问片上影子堆栈存储器。 因此,可以避免因访问堆栈而使得存储器页面缺失的问题,减少了不必要的页面切换时间。 同时利用该片上影子堆栈存储器还降低了存储功耗,加快了微处理器的运行速度使得片上系统性能大为提升,解决了当前手持终端和消费类电子在性能和功耗上的问题。
2006
2006
Shadow Stack / Pit Stack
Gwen Heeney
2006
Corpus ID: 130669498
2003
2003
Scaleable shadow stack for a configurable DSP concept
C. Panis
,
Raimund Leitner
,
J. Nurmi
The 3rd IEEE International Workshop on System-on…
2003
Corpus ID: 10287813
SoC (System-on-Chip) applications map complex system functions on a single die. The increasing importance of flexibility in SoC…
Expand
2003
2003
Poseidon: Hardware Support for Buffer Overflow Attacks
A. Vaidyanathan
2003
Corpus ID: 63553172
VAIDYANATHAN, ANURADHA Poseidon: Hardware Support for Buffer Overflow Attacks (Under the direction of Dr. Gregory T. Byrd) Stack…
Expand
1996
1996
Bottom-up tree rewriting tool MBURG
K. J. Gough
SIGP
1996
Corpus ID: 7015181
mburg is a tool for producing bottom up tree rewriters. It has been used for code selection in compilers. It produces hard coded…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required