Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems
Abstract
References
Index Terms
- Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems
Recommendations
The Performance Cost of Shadow Stacks and Stack Canaries
ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications SecurityControl flow defenses against ROP either use strict, expensive, but strong protection against redirected RET instructions with shadow stacks, or much faster but weaker protections without. In this work we study the inherent overheads of shadow stack ...
Protecting the stack with PACed canaries
SysTEX '19: Proceedings of the 4th Workshop on System Software for Trusted ExecutionStack canaries remain a widely deployed defense against memory corruption attacks. Despite their practical usefulness, canaries are vulnerable to memory disclosure and brute-forcing attacks. We propose PCan, a new approach based on ARMv8.3-A pointer ...
Pythia: Compiler-Guided Defense Against Non-Control Data Attacks
ASPLOS '24: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3Modern C/C++ applications are susceptible to Non-Control Data Attacks, where an adversary attempts to exploit memory corruption vulnerabilities for security breaches such as privilege escalation, control-flow manipulation, etc. One such popular class of ...
Comments
Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- NSF
- NCAE
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigapp
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 81Total Downloads
- Downloads (Last 12 months)81
- Downloads (Last 6 weeks)17
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in