San Francisco Bay Area Indian Community - SFIndian.com
| | | | | | | | | | | |
 


 

Google Chrome adopts Windows 10 security feature

Costa Rica,Technology

Author : Indo Asian News Service

International, National, Costa Rica, Technology Read Latest News and Articles

Share With Your Friends



Add an Article

View All Contributions

Add To My Favorite

Add A Picture

San Francisco, May 5 (IANS) To protect the memory stack from attackers, Google revealed that its Chrome 90 has adopted a new Windows 10 security feature called "Hardware-enforced Stack Protection".

Hardware-enforced Stack Protection, which Microsoft previewed in March 2020, is designed to protect against return-oriented programming (ROP) malware attacks, by using CPU hardware to protect an application's code while running inside the CPU memory.

The added protection is enabled in Chrome 90 on Windows 20H1 with December update or later and on Intel 11th Gen or AMD Zen 3 CPUs, which feature Control-flow Enforcement Technology (CET), ZDNet reported.

For several years, Intel and Microsoft have been working on CET to thwart ROP attacks, which can bypass existing memory-exploit mitigations to install malware, the report said.

CET introduced "shadow stacks", which are used exclusively for control transfer operations. These shadow stacks are isolated from the data stack and protected from tampering, it added.

Google's Chrome platform security team warns that the shadow stack might cause problems for some software loaded into Chrome.

"CET improves security by making exploits more difficult to write. However, it may affect stability if the software that loads itself into Chrome is not compatible with the mitigation," the Chrome security team said.

Google, however, has also provided details for developers who need to debug a problem in Chrome's shadow stack.

Developers can see which processes have Hardware-enforced Stack Protection enabled in Windows Task Manager, the report said.

Google describes ROP attacks as where "attackers take advantage of the process's code, as that must be executable".

--IANS

vc/vd


Copyright and Disclaimer: All news and images appearing in our news section, search engines and social media are provided by IANS. If you face any issues related to the content/images, please contact our news service provider directly. We are not liable/responsible for any content/images related to the news service provider.


Latest News

View More News


More News Articles

After 'The Broken News 2', Akshay Oberoi says agendas still dictate news

IPL 2024: Reading the batters, not trying much - the Kuldeep Yadav formula of holding your own

Karan Vohra talks about how he bonded with child actor Nihan Jain

Neha Kakkar grooves with 'Gulabi Sadi' hitmaker Sanju Rathod on 'Superstar Singer 3'

Neha Kakkar, grooves with 'Gulabi Sadi' hitmaker Sanju Rathod on 'Superstar Singer 3'