Skip to search formSkip to main contentSkip to account menu

Shadow stack

In software, a shadow stack is a mechanism for maintaining control-flow integrity by mitigating return address overwrites such as those seen during… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
A shadow stack validates on-stack return addresses and prevents arbitrary code execution vulnerabilities due to malicious returns… 
2019
2019
Defense techniques such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) were the early role… 
2017
2017
We present RIProtection (Rest In Protection), a novel Linux kernel-based approach that mitigates the tampering of return… 
2007
2007
本发明公开了一种实现片上影子堆栈存储器的方法及其电路,涉及微处理器内部堆栈操作方法和存储电路。 包括片上影子堆栈存储器,配置寄存器,片选电路,地址比较电路,地址译码电路,存储控制器,片外存储器等。 采用动态配置的方法,将在片外存储器中高频率访问的堆栈段单元的数据映射到片上影子堆栈存储器中,在微处理器进行堆栈操作时,访问片上影子堆栈存储器。 因此,可以避免因访问堆栈而使得存储器页面缺失的问题,减少了不必要的页面切换时间。 同时利用该片上影子堆栈存储器还降低了存储功耗,加快了微处理器的运行速度使得片上系统性能大为提升,解决了当前手持终端和消费类电子在性能和功耗上的问题。 
2006
2006
2003
2003
SoC (System-on-Chip) applications map complex system functions on a single die. The increasing importance of flexibility in SoC… 
2003
2003
VAIDYANATHAN, ANURADHA Poseidon: Hardware Support for Buffer Overflow Attacks (Under the direction of Dr. Gregory T. Byrd) Stack… 
1996
1996
mburg is a tool for producing bottom up tree rewriters. It has been used for code selection in compilers. It produces hard coded…