Protecting the Stack - Shadow Stack The standard protection against Stack Smashing
6
Protecting the Stack - Safe Stack
7
Shadow Stack vs Safe Stack
8
Implementing Safe Stack in QEMU
9
Protecting Function Pointers
10
Implementing icall CFI in QEMU
11
Status of patches
12
Did we accomplish something?
13
What's next?
Description:
Explore the critical topic of hypervisor security through Control-Flow Integrity in this 19-minute conference talk by Daniele Buono from IBM. Delve into the importance of Control-Flow Integrity and its implementation techniques. Learn about protecting the stack through Shadow Stack and Safe Stack methods, understanding their differences and applications. Discover the process of implementing Safe Stack in QEMU and safeguarding function pointers. Gain insights into implementing icall CFI in QEMU, review the status of patches, and evaluate the accomplishments. Conclude by examining future directions in hypervisor security.
Securing the Hypervisor with Control-Flow Integrity