Intel Corporation
Techniques for control flow protection

Last updated:

Abstract:

Various embodiments are generally directed to techniques for control flow protection with minimal performance overhead, such as by utilizing one or more micro-architectural optimizations to implement a shadow stack (SS) to verify a return address before returning from a function call, for instance. Some embodiments are particularly directed to a computing platform, such as an internet of things (IoT) platform, that overlaps or parallelizes one or more SS access operations with one or more data stack (DS) access operations.

Status:
Grant
Type:

Utility

Filling date:

26 Jun 2019

Issue date:

31 May 2022