Loading…
This event has ended. Visit the official site or create your own event on Sched.
September 11-14, 2017 - Los Angeles, CA
Click Here For Information & Registration
View analytic
Wednesday, September 13 • 2:00pm - 2:40pm
Control-flow Enforcement Technology - Yu-cheng Yu, Intel

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.
Hackers often look for buffer overflow opportunities in an application and feed it illegal input data to overwrite function return addresses, combining with “gadgets”, manipulate normal program execution path to achieve malicious behavior in a system. These techniques do not need any code injection, cannot be detected by binary signatures, and the resulting activities easily skip detection. CET blocks these exploits with the “shadow stack” that stores a secure copy of every function return address and the “end-branch” opcode that prevents arbitrary decoding of multi-byte instructions. This presentation gives an overview of CET and highlights software implementation for Linux.


Wednesday September 13, 2017 2:00pm - 2:40pm
Plaza I/II

Attendees (23)