Shadow stack

In software, a shadow stack is a mechanism for maintaining control-flow integrity by mitigating return address overwrites such as those seen during… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2002-2018
01220022018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Software attacks are commonly performed against embedded systems in order to access private data or to run restricted services… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 8
Is this relevant?
2016
2016
Control-flow hijacking is the principal method for code-reuse techniques like Return-oriented Programming (ROP) and Jump-oriented… (More)
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Control flow defenses against ROP either use strict, expensive, but strong protection against redirected RET instructions with… (More)
  • figure 1
  • figure 5
  • figure 10
  • table 1
Is this relevant?
2015
2015
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain arbitrary code execution. One… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Control flow integrity (CFI) has been proposed as an approach to defend against control-hijacking memory corruption attacks. CFI… (More)
  • figure 3
  • figure 1
  • figure 2
  • figure 4
  • figure 6
Is this relevant?
2015
2015
Applications written in low-level languages without type or memory safety are prone to memory corruption. Attackers gain code… (More)
Is this relevant?
2014
2014
Program instrumentation techniques form the basis of many recent software security defenses, including defenses against common… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
In many embedded system, researches focus on how to use on-chip memory, like SPM, to reduce the energy consumption generated by… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2006
2006
Exploitation of buffer overflow vulnerabilities constitutes a significant portion of security attacks in computer systems. One of… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2003
2003
SoC (System-on-Chip) applications map complex system functions on a single die. The increasing importance of flexibility in SoC… (More)
  • figure 2
  • figure 3
  • figure 5
  • figure 7
  • figure 6
Is this relevant?