Unresolved
Details
RVI Staff Action
Not RequiredGroup Creation Date
Jun 13, 2022Assignee
UnassignedUnassignedReporter
Rafael SeneRafael SeneChair Start Date
Apr 01, 2024Chair End Date
Apr 12, 2025Vice-Chair Start Date
Apr 01, 2024Vice-chair End Date
Apr 12, 2025
Details
Details
RVI Staff Action
Not Required
Group Creation Date
Jun 13, 2022
Assignee
Unassigned
UnassignedReporter
Rafael Sene
Rafael SeneChair Start Date
Apr 01, 2024
Chair End Date
Apr 12, 2025
Vice-Chair Start Date
Apr 01, 2024
Vice-chair End Date
Apr 12, 2025
Created July 14, 2023 at 8:09 PM
Updated February 18, 2025 at 9:17 PM
Advanced exploitation techniques based on code reuse, do not introduce new code in vulnerable programs. Code reuse attacks are based on diverting the control flow of an application by overwriting function pointers and return addresses.
The SS-LP-CFI task group will define privileged and unprivileged ISA extensions that can be used by privileged and unprivileged programs to protect the integrity of their control-flow. Specifically, for protecting backward-edges we will define a shadow stack for storing return-addresses in each privilege level. For protecting forward-edges we will design a flexible label based landing pads approach which will ensure that the execution adheres to the application's Control-Flow Graph. The design will follow the threat model compiled in CFI-SIG and will be updated on demand.
The TG will develop written specification, executable model, simulator (Spike, QEMU), prototype implementations (CVA6), toolchain prototype (llvm, binutils, glibc), OS prototype (Linux) and compliance suite (Sail specification) for the RISC-V CFI extensions.
Leadership History
Period
Chair
Vice-Chair
2023-2024
Giorgos Christou <gchristou@tuc.gr>
Ved Shanbhogue <ved@rivosinc.com>