Skip to search formSkip to main contentSkip to account menu

Shadow stack

In software, a shadow stack is a mechanism for maintaining control-flow integrity by mitigating return address overwrites such as those seen during… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Recent works on Control-Flow Integrity (CFI) have mainly focused on Context-Sensitive CFI policies to provide higher security… 
2019
2019
With the recent proliferation of Internet of Things (IoT) and embedded devices, there is a growing need to develop a security… 
2019
2019
Return-Oriented Programming (ROP) is a typical attack technique that exploits return addresses to abuse existing code repeatedly… 
2018
2018
Control-Flow Hijacking attacks are the dominant attack vector to compromise systems. Control-Flow Integrity (CFI) solutions… 
2017
2017
The information collected from hardware performance counters in a typical processor is commonly employed for power management… 
Highly Cited
2016
Highly Cited
2016
Control-flow hijacking is the principal method for code-reuse techniques like Return-oriented Programming (ROP) and Jump-oriented… 
2012
2012
Dextrous object manipulation with multi-fingered robot hands remains one of the key challenges of service robotics. So far, most… 
2008
2008
In many embedded system, researches focus on how to use on-chip memory, like SPM, to reduce the energy consumption generated by… 
2003
2003
SoC (System-on-Chip) applications map complex system functions on a single die. The increasing importance of flexibility in SoC… 
1996
1996
mburg is a tool for producing bottom up tree rewriters. It has been used for code selection in compilers. It produces hard coded…