What you've learned

You should now know how to:

  • Create a simple application on an Arm server with Pointer Authentication
  • Compile the application with and without Pointer Authentication to inspect the instructions generated
  • Exploit the applications with and without Pointer Authentication to demonstrate how Pointer Authentication instructions enhance security.

Knowledge Check

Is pointer authentication available on all Arm Cortex-A CPUs?

When using pointer authentication, the signature of the address is stored in the lowest bits of the 64-bit address.


Back
Next