Announcement

Collapse
No announcement yet.

POWER10 Adds New Instructions For Helping Fend Off ROP Exploits

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • xorbe
    replied
    Probably a random hash key per boot and per guest instance. The hash needs to be ultra fast though.

    Leave a comment:


  • baryluk
    replied
    My guess, it is using a hardware assisted shadow stack, with hardware assisted encryption for hashing pointers, so they can't be forged. Nice and performant solution.

    Leave a comment:


  • programmerjake
    replied
    you can get the POWER10 ISA manual (or more specifically the OpenPower ISA v3.1 spec) here:
    https://wiki.raptorcs.com/w/images/f...ublic.v3.1.pdf

    I didn't check if it describes the instructions mentioned in the article, but it seems likely to me.

    (EDIT: they're not actually included in the v3.1 spec)
    Last edited by programmerjake; 11 January 2021, 05:39 AM.

    Leave a comment:


  • POWER10 Adds New Instructions For Helping Fend Off ROP Exploits

    Phoronix: POWER10 Adds New Instructions For Helping Fend Off ROP Exploits

    The POWER10 architecture is adding several new instructions to help prevent return-oriented programming exploits...

    http://www.phoronix.com/scan.php?pag...P-Instructions
Working...
X