YoVDO

Shining Light on Shadow Stacks

Offered By: IEEE via YouTube

Tags

Software Security Courses Compiler Design Courses

Course Description

Overview

Explore the comprehensive analysis of shadow stack mechanisms for protecting against control-flow hijacking attacks in C/C++ programs. Delve into the performance, compatibility, and security aspects of various shadow stack designs presented at the 2019 IEEE Symposium on Security & Privacy. Learn about the proposed Shadesmar design, which leverages a dedicated register for improved performance and minimal memory overhead. Examine case studies demonstrating the feasibility of dedicating a general-purpose register to security monitoring on modern architectures. Gain insights into the potential of Intel x86 extensions for memory protection and page table control in enhancing intra-process memory isolation. Understand the design requirements for dedicated hardware mechanisms supporting precise software security mitigations and their implications for future cybersecurity efforts.

Syllabus

Intro
Backward Edge Pointer
State of CFI Mitigation
Shadow Stacks
Control Flow Hijacking
What is a Shadow Stack
Shadow Stack Advantages
Shadow Stack Design
Recommended Shadow Stack
General Purpose Register
Compatibility
Integrity Protection
Integrity Enforcement
Performance Evaluation
Conclusion


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera
Engineering Maintainable Android Apps
Vanderbilt University via Coursera
Software Design as an Element of the Software Development Lifecycle
University of Colorado System via Coursera
Secure Software Development
Pluralsight
Secure Software Concepts for CSSLPĀ®
Pluralsight