Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Fix reference to s/keystone/capstone

...

  • Prior experience with ARMv8-A assembler programming (AArch64 instruction set).
  • Prior experience with Keystone assembler Capstone disassemby framework programming [9].
  • Basic understanding of ARM Pointer Authentication.

...

[1]: Shacham. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). 
      In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 552-561. 2007.
      DOI: https://doi.org/10.1145/1315245.1315313
[2]: Kornau. Return Oriented Programming for the ARM Architecture. MSc thesis. Ruhr-Universität Bochum. 2009.
[3]: https://github.com/JonathanSalwan/ROPgadget
[4]: https://github.com/Boyan-MILANOV/ropgenerator
[5]: Qualcomm. Pointer Authentication on ARMv8.3. Whitepaper. 2017.
[6]: Liljestrand et al. PAC it up: Towards pointer integrity using ARM pointer authentication.
      In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, pages 177–194, 2019
[7]: Using the GNU Compiler Collection (GCC 7.10): 3.18.1 AArch64 Options. [Retrieved 2019-09-10]
[8]: Using the GNU Compiler Collection (GCC 9.10): 3.18.1 AArch64 Options. [Retrieved 2019-09-10]
[9]: httphttps://www.keystonecapstone-engine.org/

For further information: Please contact Thomas Nyman (thomas.nyman@aalto.fi), Hans Liljestrand (hans.liljestrand@aalto.fi) and prof. N. Asokan.

...