Statements (19)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Computer_Security_Technique
|
| gptkbp:alternativeTo |
gptkb:Stack_Canaries
|
| gptkbp:implementedIn |
Operating Systems
Compilers |
| gptkbp:prevention |
Return-Oriented Programming Attacks
Stack Buffer Overflow Exploits |
| gptkbp:relatedTo |
gptkb:Control_Flow_Guard
Call Stack Stack Smashing |
| gptkbp:supportedBy |
gptkb:Linux_Kernel
gptkb:Intel_CET gptkb:Windows_10 |
| gptkbp:usedFor |
gptkb:Control_Flow_Integrity
Return Address Protection |
| gptkbp:usedIn |
Software Security
|
| gptkbp:bfsParent |
gptkb:Zen_4
gptkb:Intel_Control-Flow_Enforcement_Technology |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Shadow Stack
|