generated from riscv/docs-spec-template
-
Notifications
You must be signed in to change notification settings - Fork 22
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #205 from gcchri/main
Create CHARTER.md
- Loading branch information
Showing
1 changed file
with
9 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
Advanced exploitation techniques based on code reuse, do not introduce new code in vulnerable | ||
programs. Code reuse attacks are based on diverting the control flow of an application by overwriting | ||
function pointers and return addresses. The Shadow Stack and Landing Pads task group will define | ||
privileged and unprivileged ISA extensions that can be used by privileged and unprivileged programs | ||
to protect the integrity of their control-flow. Specifically, for protecting backward-edges we will define | ||
a shadow stack for storing return-addresses in each privilege level. For protecting forward-edges we will | ||
design a flexible label based landing pads approach which will ensure that the execution adheres to the | ||
application’s Control-Flow Graph. The design will follow the threat model compiled in CFI-SIG and will be | ||
updated on demand. |