ROP'у немножко поплохеет

Jun 11, 2016 13:53

https://blogs.intel.com/evangelists/2016/06/09/intel-release-new-technology-specifications-protect-rop-attacks/

CET defines a second stack (shadow stack) exclusively used for control transfer operations, in addition to the traditional stack used for control transfer and data. When CET is enabled, CALL instruction pushes the return address into a shadow stack in addition to its normal behavior of pushing return address into the normal stack (no changes to traditional stack operation). The return instructions (e.g. RET) pops return address from both shadow and traditional stacks, and only transfers control to popped address if return addresses from both stacks match.

Control-flow Enforcement - Technology Preview

Нужно детальнее изучать, например, про jmp [r32] или jmp r32

exploits, intel

Previous post Next post
Up