Intel Corporation
Techniques for control flow protection
Last updated:
Abstract:
Various embodiments are generally directed to techniques for control flow protection with minimal performance overhead, such as by utilizing one or more micro-architectural optimizations to implement a shadow stack (SS) to verify a return address before returning from a function call, for instance. Some embodiments are particularly directed to a computing platform, such as an internet of things (IoT) platform, that overlaps or parallelizes one or more SS access operations with one or more data stack (DS) access operations.
Status:
Grant
Type:
Utility
Filling date:
26 Jun 2019
Issue date:
31 May 2022