context: describe stack clash/guard page

This commit is contained in:
steveej 2017-09-23 00:47:16 +02:00
parent 79a1b918d6
commit 5fb007ba40
4 changed files with 84 additions and 44 deletions

View file

@ -3,15 +3,11 @@ Any changes to this file will be lost if it is regenerated by Mendeley.
BibTeX export options can be customized via Options -> BibTeX in Mendeley Desktop
@article{Matz2009,
author = {Matz, M and Hubicka, J and Jaeger, a and Mitchell, M},
file = {:home/steveej/src/steveej/msc-thesis/docs/System V Application Binary Interface AMD64 Architecture Processor Supplement Draft Version 0.99.7.pdf:pdf},
isbn = {013877630X},
pages = {1--128},
pmid = {2477614},
title = {{System V Application Binary Interface AMD64 Architecture Processor Supplement}},
url = {papers2://publication/uuid/CD8D5668-B1F5-4FE3-BAD8-25F1E589A9E5},
year = {2009}
@misc{TheStackClash,
author = {Advisory, Qualys Security},
file = {:home/steveej/src/steveej/msc-thesis/docs/stack-clash.txt:txt},
title = {{The Stack Clash}},
url = {https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt}
}
@article{Lattner2005,
abstract = {The LLVM Compiler Infrastructure (http://llvm.cs. uiuc.edu) is a$\backslash$nrobust system that is well suited for a wide variety of research$\backslash$nand development work. This brief paper introduces the LLVM system$\backslash$nand provides pointers to more extensive documentation, complementing$\backslash$nthe tutorial presented at LCPC.},
@ -125,6 +121,16 @@ file = {:home/steveej/src/github/steveej/msc-thesis/docs/DRAFT$\backslash$: Syst
title = {{DRAFT: System Programming in Rust: Beyond Safety}},
year = {2017}
}
@article{Matz2009,
author = {Matz, M and Hubicka, J and Jaeger, a and Mitchell, M},
file = {:home/steveej/src/steveej/msc-thesis/docs/System V Application Binary Interface AMD64 Architecture Processor Supplement Draft Version 0.99.7.pdf:pdf},
isbn = {013877630X},
pages = {1--128},
pmid = {2477614},
title = {{System V Application Binary Interface AMD64 Architecture Processor Supplement}},
url = {papers2://publication/uuid/CD8D5668-B1F5-4FE3-BAD8-25F1E589A9E5},
year = {2009}
}
@article{Chisnall2015,
abstract = {We propose a new memory-safe interpretation of the C ab-stract machine that provides stronger protection to benefit security and debugging. Despite ambiguities in the specifi-cation intended to provide implementation flexibility, con-temporary implementations of C have converged on a mem-ory model similar to the PDP-11, the original target for C. This model lacks support for memory safety despite well-documented impacts on security and reliability. Attempts to change this model are often hampered by as-sumptions embedded in a large body of existing C code, dat-ing back to the memory model exposed by the original C compiler for the PDP-11. Our experience with attempting to implement a memory-safe variant of C on the CHERI ex-perimental microprocessor led us to identify a number of problematic idioms. We describe these as well as their in-teraction with existing memory safety schemes and the as-sumptions that they make beyond the requirements of the C specification. Finally, we refine the CHERI ISA and abstract model for C, by combining elements of the CHERI capabil-ity model and fat pointers, and present a softcore CPU that implements a C abstract machine that can run legacy C code with strong memory protection guarantees.},
author = {Chisnall, David and Rothwell, Colin and Watson, Robert N M and Woodruff, Jonathan and Vadera, Munraj and Moore, Simon W and Roe, Michael and Davis, Brooks and Neumann, Peter G},