Главная
Study mode:
on
1
SECURITY SUMMIT
2
Memory Corruption Bugs Enable controllow hiacking
3
Coarse-Grained Control-Flow Integrity Forward-edges
4
Fine-Grained Control-Flow Integrity Prototype matching-based implementations
5
Regular Assembly Code
6
IBT Assembly Code
7
FinelBT Cross-DSO support Method 1 - FinelBT Global Flag
8
FinelBT PLT Assembly Code
9
FinelBT Cross-DSO support Method 2 - Consulting Shadow Stack (under development)
10
FinelBT Other perks
11
FinelBT Implementation
12
Test Sets
13
SPEC CPU 2017 (nc)
14
Space Overheads
15
Hypotheses
16
Important People Thank you!
Description:
Explore hardware-assisted fine-grained control-flow integrity techniques in this Linux Foundation conference talk. Delve into memory corruption bugs, coarse-grained and fine-grained control-flow integrity, and Intel's Control-flow Enforcement Technology (CET) with Indirect Branch Tracking (IBT). Learn about prototype matching-based implementations, regular and IBT assembly code, and cross-DSO support methods. Discover the perks and implementation details of FinelBT, including space overheads and performance impacts using SPEC CPU 2017 benchmarks. Gain insights into enhancing security measures against control-flow hijacking attacks in modern computing systems.

Hardware-Assisted Fine-Grained Control-Flow Integrity - Adding Lasers to Intel's CET/IBT

Linux Foundation
Add to list
0:00 / 0:00