Related information
Here are some resources related to information in this guide:
- Arm architecture and reference manuals: Find technical manuals and documentation relating to this guide and other similar topics
- Arm Community: Ask development questions, and find articles and blogs on specific topics from Arm experts
- Armv8-A Instruction Set Architecture: More information on the Procedure Call Standard
- The QARMA Block Cipher Family: Information on the QARMA cipher from the International Association for Cryptologic Research
- Control-Flow-Integrity: NSA paper on control flow protection. While not specific to the Arm architecture, the paper provides good background reading on the topic
Detecting memory safety violoations
- Adopting the Arm Memory Tagging Extension in Android: Google blog about their use of memory tagging techniques to locate memory safety bugs
- Armv8.5-A Memory Tagging Extension: Arm white paper with a detailed description of the memory tagging technology
Pointer authentication
- Armv8.3-A pointer authentication support: The patches that added support for pointer authentication to the Linux kernel give information on how the technology is used in practice
- Code reuse attacks: the compiler story: Arm blog discussing the use of Pointer authentication and Branch Target