Abstract
Stack canaries remain a widely deployed defense against memory corruption attacks. Despite their practical usefulness, canaries are vulnerable to memory disclosure and brute-forcing attacks. We propose PCan, a new approach based on ARMv8.3-A pointer authentication (PA), that uses dynamically-generated canaries to mitigate these weaknesses and show that it provides more fine-grained protection with minimal performance overhead.
Cite
CITATION STYLE
Liljestrand, H., Gauhar, Z., Nyman, T., Ekberg, J. E., & Asokan, N. (2019). Protecting the stack with PACed canaries. In Proceedings of the 4th Workshop on System Software for Trusted Execution, SysTEX 2019. Association for Computing Machinery, Inc. https://doi.org/10.1145/3342559.3365336
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.