Announcement
Collapse
No announcement yet.
POWER10 Adds New Instructions For Helping Fend Off ROP Exploits
Collapse
X
-
Probably a random hash key per boot and per guest instance. The hash needs to be ultra fast though.
-
My guess, it is using a hardware assisted shadow stack, with hardware assisted encryption for hashing pointers, so they can't be forged. Nice and performant solution.
Leave a comment:
-
you can get the POWER10 ISA manual (or more specifically the OpenPower ISA v3.1 spec) here:
https://wiki.raptorcs.com/w/images/f...ublic.v3.1.pdf
I didn't check if it describes the instructions mentioned in the article, but it seems likely to me.
(EDIT: they're not actually included in the v3.1 spec)Last edited by programmerjake; 11 January 2021, 05:39 AM.
Leave a comment:
-
POWER10 Adds New Instructions For Helping Fend Off ROP Exploits
Phoronix: POWER10 Adds New Instructions For Helping Fend Off ROP Exploits
The POWER10 architecture is adding several new instructions to help prevent return-oriented programming exploits...
http://www.phoronix.com/scan.php?pag...P-InstructionsTags: None
Leave a comment: