2018
DOI: 10.48550/arxiv.1811.09189
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

PAC it up: Towards Pointer Integrity using ARM Pointer Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(11 citation statements)
references
References 24 publications
0
11
0
Order By: Relevance
“…Due to lack of publicly available PA-capable hardware we have used an evaluation approach similar to prior work [8,9]. We used the ARMv8-A Base Platform Fixed Virtual Platform (FVP), based on Fast Models 11.5, which supports ARMv8.3-A for functional evaluation.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Due to lack of publicly available PA-capable hardware we have used an evaluation approach similar to prior work [8,9]. We used the ARMv8-A Base Platform Fixed Virtual Platform (FVP), based on Fast Models 11.5, which supports ARMv8.3-A for functional evaluation.…”
Section: Discussionmentioning
confidence: 99%
“…Signed return addresses provides similar protection to stack canaries, i.e., if a stack-buffer overflow corrupts the return address, this is detected when the return address is verified before returning from a function (Figure 3). However, PA is vulnerable to reuse attacks where previously encountered signed pointers can be used to used to replace latter signed pointers using the same key and modifier [9]. For instance, -msign-return-address can be circumvented by reusing a prior return address signed using the same SP value.…”
Section: Armv8-a Pointer Authenticationmentioning
confidence: 99%
See 2 more Smart Citations
“…One initial use case of PA is the signing and verification of return addresses [39]. However, current PA schemes are vulnerable to reuse attacks, where the adversary can reuse previously observed valid protected pointers [31]. Prior work [31,39] and current implementations by GCC 1 and LLVM 2 mitigate reuse attacks, but cannot completely prevent them.…”
Section: Introductionmentioning
confidence: 99%