January 8, 2020

161 words 1 min read

Control-flow Enforcement Technology

Control-flow Enforcement Technology

Hackers often look for buffer overflow opportunities in an application and feed it illegal input data to overwrite function return addresses, combining with gadgets, manipulate normal program execut …

Talk Title Control-flow Enforcement Technology
Speakers Yu-cheng Yu
Conference Open Source Summit North America
Conf Tag
Location Los Angeles, CA, United States
Date Sep 10-14, 2017
URL Talk Page
Slides Talk Slides
Video

Hackers often look for buffer overflow opportunities in an application and feed it illegal input data to overwrite function return addresses, combining with “gadgets”, manipulate normal program execution path to achieve malicious behavior in a system. These techniques do not need any code injection, cannot be detected by binary signatures, and the resulting activities easily skip detection. CET blocks these exploits with the “shadow stack” that stores a secure copy of every function return address and the “end-branch” opcode that prevents arbitrary decoding of multi-byte instructions. This presentation gives an overview of CET and highlights software implementation for Linux.

comments powered by Disqus