Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,307 papers from all fields of science
Search
Sign In
Create Free Account
Shadow stack
In software, a shadow stack is a mechanism for maintaining control-flow integrity by mitigating return address overwrites such as those seen during…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Call stack
Compiler
Control-flow integrity
Exploit (computer security)
Expand
Broader (2)
Computer security
Memory management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Efficient Context-Sensitive CFI Enforcement Through a Hardware Monitor
Sadullah Canakci
,
Leila Delshadtehrani
,
Boyou Zhou
,
A. Joshi
,
Manuel Egele
International Conference on Detection of…
2020
Corpus ID: 220248208
Recent works on Control-Flow Integrity (CFI) have mainly focused on Context-Sensitive CFI policies to provide higher security…
Expand
2019
2019
FIXER: Flow Integrity Extensions for Embedded RISC-V
Asmit De
,
Aditya Basu
,
Swaroop Ghosh
,
T. Jaeger
Design, Automation and Test in Europe
2019
Corpus ID: 155108241
With the recent proliferation of Internet of Things (IoT) and embedded devices, there is a growing need to develop a security…
Expand
2019
2019
Zipper Stack: Shadow Stacks Without Shadow
Jinfeng Li
,
Liwei Chen
,
+4 authors
Dan Meng
European Symposium on Research in Computer…
2019
Corpus ID: 59600004
Return-Oriented Programming (ROP) is a typical attack technique that exploits return addresses to abuse existing code repeatedly…
Expand
2018
2018
Shining Light On Shadow Stacks
N. Burow
,
Xinping Zhang
,
Mathias Payer
arXiv.org
2018
Corpus ID: 260491891
Control-Flow Hijacking attacks are the dominant attack vector to compromise systems. Control-Flow Integrity (CFI) solutions…
Expand
2017
2017
Varanus : An Infrastructure for Programmable Hardware Monitoring Units
Leila Delshadtehrani
,
J. Appavoo
,
Manual Egele
,
A. Joshi
,
Schuyler Eldridge
2017
Corpus ID: 13670286
The information collected from hardware performance counters in a typical processor is commonly employed for power management…
Expand
Highly Cited
2016
Highly Cited
2016
HCFI: Hardware-enforced Control-Flow Integrity
Nick Christoulakis
,
G. Christou
,
E. Athanasopoulos
,
S. Ioannidis
Conference on Data and Application Security and…
2016
Corpus ID: 605252
Control-flow hijacking is the principal method for code-reuse techniques like Return-oriented Programming (ROP) and Jump-oriented…
Expand
2012
2012
Hybrid physics simulation of multi-fingered hands for dexterous in-hand manipulation
Hanno Scharfe
,
N. Hendrich
,
Jianwei Zhang
IEEE International Conference on Robotics and…
2012
Corpus ID: 9407171
Dextrous object manipulation with multi-fingered robot hands remains one of the key challenges of service robotics. So far, most…
Expand
2008
2008
Shadow Stack Scratch-Pad-Memory for Low Power SoC
Ling Ming
,
Xianqiang Shi
,
Zhang Yu
Fifth IEEE International Symposium on Embedded…
2008
Corpus ID: 17691165
In many embedded system, researches focus on how to use on-chip memory, like SPM, to reduce the energy consumption generated by…
Expand
2003
2003
Scaleable shadow stack for a configurable DSP concept
C. Panis
,
Raimund Leitner
,
J. Nurmi
The 3rd IEEE International Workshop on System-on…
2003
Corpus ID: 10287813
SoC (System-on-Chip) applications map complex system functions on a single die. The increasing importance of flexibility in SoC…
Expand
1996
1996
Bottom-up tree rewriting tool MBURG
K. J. Gough
SIGP
1996
Corpus ID: 7015181
mburg is a tool for producing bottom up tree rewriters. It has been used for code selection in compilers. It produces hard coded…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE