Announcement

Collapse
No announcement yet.

POWER10 Adds New Instructions For Helping Fend Off ROP Exploits

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • xorbe
    replied
    Probably a random hash key per boot and per guest instance. The hash needs to be ultra fast though.

    Leave a comment:


  • baryluk
    replied
    My guess, it is using a hardware assisted shadow stack, with hardware assisted encryption for hashing pointers, so they can't be forged. Nice and performant solution.

    Leave a comment:


  • programmerjake
    replied
    you can get the POWER10 ISA manual (or more specifically the OpenPower ISA v3.1 spec) here:
    https://wiki.raptorcs.com/w/images/f...ublic.v3.1.pdf

    I didn't check if it describes the instructions mentioned in the article, but it seems likely to me.

    (EDIT: they're not actually included in the v3.1 spec)
    Last edited by programmerjake; 11 January 2021, 05:39 AM.

    Leave a comment:


  • POWER10 Adds New Instructions For Helping Fend Off ROP Exploits

    Phoronix: POWER10 Adds New Instructions For Helping Fend Off ROP Exploits

    The POWER10 architecture is adding several new instructions to help prevent return-oriented programming exploits...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite
Working...
X