Stack buffer overflows are an all too common failure mode in embedded systems where a program accidentally, or maliciously, overwrites fixed-length buffers on the call stack resulting in loss of system integrity. This blog describes how the ARM Compiler incorporates a stack protection security feature which can prevent stack buffer overflows, thus improving overall system integrity. Call Stack Basics A call stack, or simply ‘stack,’ is a data structure that stores information about software subroutines which are active during software exe...
AF: Check out the Embedded Pi - A Triple-play platform for Raspberry Pi, Arduino and 32-bit embedded #ARM#Cortex-M - http://t.co/Dm9bc6bc15 less than 5 seconds ago