Statements (18)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Computer Security Technique
|
gptkbp:alternativeTo |
gptkb:Stack_Canaries
|
https://www.w3.org/2000/01/rdf-schema#label |
Shadow Stack
|
gptkbp:implementedIn |
Operating Systems
Compilers |
gptkbp:prevention |
Return-Oriented Programming Attacks
Stack Buffer Overflow Exploits |
gptkbp:relatedTo |
gptkb:Control_Flow_Guard
Call Stack Stack Smashing |
gptkbp:supportedBy |
gptkb:Linux_Kernel
gptkb:Intel_CET gptkb:Windows_10 |
gptkbp:usedFor |
gptkb:Control_Flow_Integrity
Return Address Protection |
gptkbp:usedIn |
Software Security
|
gptkbp:bfsParent |
gptkb:Intel_Control-Flow_Enforcement_Technology
|
gptkbp:bfsLayer |
6
|