Global Information Lookup Global Information

Shadow stack information


In computer security, a shadow stack is a mechanism for protecting a procedure's stored return address,[1] such as from a stack buffer overflow. The shadow stack itself is a second, separate stack that "shadows" the program call stack. In the function prologue, a function stores its return address to both the call stack and the shadow stack. In the function epilogue, a function loads the return address from both the call stack and the shadow stack, and then compares them. If the two records of the return address differ, then an attack is detected; the typical course of action is simply to terminate the program or alert system administrators about a possible intrusion attempt. A shadow stack is similar to stack canaries in that both mechanisms aim to maintain the control-flow integrity of the protected program by detecting attacks that tamper the stored return address by an attacker during an exploitation attempt.

Shadow stacks can be implemented by recompiling programs with modified prologues and epilogues,[2] by dynamic binary rewriting techniques to achieve the same effect,[3] or with hardware support.[4] Unlike the call stack, which also stores local program variables, passed arguments, spilled registers and other data, the shadow stack typically just stores a second copy of a function's return address.

Shadow stacks provide more protection for return addresses than stack canaries, which rely on the secrecy of the canary value and are vulnerable to non-contiguous write attacks.[5] Shadow stacks themselves can be protected with guard pages[6] or with information hiding, such that an attacker would also need to locate the shadow stack to overwrite a return address stored there.

Like stack canaries, shadow stacks do not protect stack data other than return addresses, and so offer incomplete protection against security vulnerabilities that result from memory safety errors.

In 2016, Intel announced upcoming hardware support for shadow stacks with their Control-flow Enforcement Technology.[7]

Shadow stacks face some compatibility problems. After a program throws an exception or a longjmp occurs, the return address at the top of the shadow stack will not match return address popped from the call stack. The typical solution for this problem is to pop entries from the shadow stack until a matching return address is found, and to only terminate the program when no match is found in the shadow stack.[3]

A multithreaded program, which would have a call stack for each executing thread, would then also have a shadow stack shadowing each of the call stacks.

  1. ^ Delshadtehrani, Leila; Eldridge, Schuyler; Canakci, Sadullah; Egele, Manuel; Joshi, Ajay (2018-01-01). "Nile: A Programmable Monitoring Coprocessor". IEEE Computer Architecture Letters. 17 (1): 92–95. doi:10.1109/LCA.2017.2784416. ISSN 1556-6056.
  2. ^ Cite error: The named reference Stackshield was invoked but never defined (see the help page).
  3. ^ a b Cite error: The named reference truss was invoked but never defined (see the help page).
  4. ^ Cite error: The named reference SmashGuard was invoked but never defined (see the help page).
  5. ^ Cite error: The named reference SoK was invoked but never defined (see the help page).
  6. ^ Cite error: The named reference RAD was invoked but never defined (see the help page).
  7. ^ Cite error: The named reference CET was invoked but never defined (see the help page).

and 23 Related for: Shadow stack information

Request time (Page generated in 0.8575 seconds.)

Shadow stack

Last Update:

security, a shadow stack is a mechanism for protecting a procedure's stored return address, such as from a stack buffer overflow. The shadow stack itself is...

Word Count : 590

X86 instruction listings

Last Update:

a shadow stack (CET_SS), and indirect branch tracking (CET_IBT). The RDSSPD and RDSSPQ instructions act as NOPs on processors where shadow stacks are...

Word Count : 15477

CPUID

Last Update:

order no. 325462-080, June 2023 - information about prematurely busy shadow stacks provided in Volume 1, section 17.2.3 on page 410; Volume 2A, table 3...

Word Count : 10769

Code sanitizer

Last Update:

uses Armv8.5-A features for very low overhead ShadowCallStack, an AArch64 tool that provides a shadow stack protection Scudo Hardened Allocator, an alternative...

Word Count : 1432

IPv6

Last Update:

bypassing it. Shadow networks have occurred on business networks in which enterprises are replacing Windows XP systems that do not have an IPv6 stack enabled...

Word Count : 7511

Control register

Last Update:

Keys PKRU register 10 PASID 11 CET_U Intel CET User shadow stack 12 CET_S Supervisor shadow stack 13 HDC Hardware Duty Cycling 14 UINTR User interrupts...

Word Count : 1634

Alder Lake

Last Update:

technology (CET), including support for indirect branch tracking (IBT) and shadow stack (SS) 4–30 MB L3 cache Cores: up to 8 P-cores and 8 E-cores on desktop...

Word Count : 2703

X86 calling conventions

Last Update:

bytes of "shadow space" on the stack right before calling the function (regardless of the actual number of parameters used), and to pop the stack after the...

Word Count : 4785

Tiger Lake

Last Update:

history size of 194 taken branches) Indirect branch tracking and CET shadow stack Intel Key Locker Intel Xe-LP ("Gen12") GPU with up to 96 execution units...

Word Count : 1528

Willow Cove

Last Update:

techniques Full memory (RAM) encryption Indirect branch tracking and shadow stack Intel Key Locker AVX/AVX2 instructions support for Pentium Gold and Celeron...

Word Count : 532

Zen 3

Last Update:

Broadcast TLB flushing CET_SS – Control-flow Enforcement Technology / Shadow Stack Improved integer units 96 entry integer scheduler (up from 92) 192 entry...

Word Count : 2990

Linux kernel version history

Last Update:

announcement". Retrieved 20 February 2021. "Ubuntu kernel lifecycle and enablement stack". Ubuntu.com. Torvalds, Linus (1 November 2015). "Linux 4.3 is out". LKML...

Word Count : 7541

Shadow banning

Last Update:

have fixed "shadow ban" of prominent Republicans like the RNC chair and Trump Jr.'s spokesman". Vice News. Retrieved 15 August 2018. Stack, Liam (26 July...

Word Count : 2362

Intel Core

Last Update:

techniques Full memory (RAM) encryption Indirect branch tracking and shadow stack Intel Key Locker AVX/AVX2 instructions support for Pentium Gold and Celeron...

Word Count : 10567

Drop shadow

Last Update:

design and computer graphics, a drop shadow is a visual effect consisting of a drawing element which looks like the shadow of an object, giving the impression...

Word Count : 444

Glibc

Last Update:

January 2024 The stdbit.h header has been added from ISO C2X. Support for shadow stacks on x86_64, new security features, and the removal of libcrypt....

Word Count : 2351

Register file

Last Update:

stack pointer register, 1 stack base register, 1 instruction pointer, 1 flags register, and 6 segment registers. One copy of 8 x87 FP push down stack...

Word Count : 4258

Control flow

Last Update:

control-flow integrity techniques, including stack canaries, buffer overflow protection, shadow stacks, and vtable pointer verification, are used to...

Word Count : 5971

Stick Figure

Last Update:

the San Diego area and shortly after released his subsequent album, Smoke Stack. This album followed the same recording style of the previous two albums...

Word Count : 2766

Shadow Hunters

Last Update:

Shadow Hunters (シャドウハンターズ, shadō hantāzu) is a social deduction board game designed by Yasutaka Ikeda that was first published in 2005 by Game Republic...

Word Count : 1151

Viscera Cleanup Detail

Last Update:

well as secondary bonus tasks. These include stacking items like crates and barrels in a designated stacking area and filing disaster reports on the events...

Word Count : 1132

Shadow cabinet of Australia

Last Update:

Australia. The shadow cabinet is the highest level of the shadow ministry (or "opposition frontbench"), which also includes other less senior shadow ministers...

Word Count : 458

CZ 75

Last Update:

Korean Pistol Baek-Du-San". "Rock Island's MAPP MS". 14 December 2018. "StackPath". A Czech emigrant Ing. Tůma was among first to start manufacturing...

Word Count : 4399

PDF Search Engine © AllGlobal.net