Bypassing memory safety mechanisms through speculative control flow hijacks

2021 IEEE European Symposium on Security and Privacy (EuroS&P)(2021)

引用 12|浏览114
暂无评分
摘要
The prevalence of memory corruption bugs in the past decades resulted in numerous defenses, such as stack canaries, control flow integrity (CFI), and memory-safe languages. These defenses can prevent entire classes of vulnerabilities, and help increase the security posture of a program. In this paper, we show that memory corruption defenses can be bypassed using speculative execution attacks. We s...
更多
查看译文
关键词
Transient Execution,Hardware Security,Side Channels,Speculative ROP,Memory Safety Mechanisms,Operating System Security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要