Protecting the stack with PACed canaries

09/12/2019
by   Hans Liljestrand, et al.
0

Stack canaries remain a widely deployed defense against memory corruption attacks. Despite their practical usefulness, canaries are vulnerable to memory disclosure and brute-forcing attacks. We propose PCan, a new approach based on ARMv8.3-A pointer authentication (PA), that uses dynamically-generated canaries to mitigate these weaknesses and show that it provides more fine-grained protection with minimal performance overhead.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset