From 0c56041dcd7ae5af79b51bbe6cbce7631c52d3bb Mon Sep 17 00:00:00 2001 From: Carlos Holguera Date: Thu, 7 Nov 2024 16:03:30 +0100 Subject: [PATCH] Update MASWE-0116.md --- weaknesses/MASVS-CODE/MASWE-0116.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/weaknesses/MASVS-CODE/MASWE-0116.md b/weaknesses/MASVS-CODE/MASWE-0116.md index 9ef191053f..c90b1d31a5 100644 --- a/weaknesses/MASVS-CODE/MASWE-0116.md +++ b/weaknesses/MASVS-CODE/MASWE-0116.md @@ -11,6 +11,8 @@ refs: - https://www.mcafee.com/enterprise/en-us/assets/white-papers/wp-secure-coding-android-applications.pdf - https://mas.owasp.org/MASTG/0x05i-Testing-Code-Quality-and-Build-Settings/#binary-protection-mechanisms - https://mas.owasp.org/MASTG/0x06i-Testing-Code-Quality-and-Build-Settings/#binary-protection-mechanisms +- https://sensepost.com/blog/2021/on-ios-binary-protections/ +- https://www.sans.org/blog/stack-canaries-gingerly-sidestepping-the-cage/ draft: description: e.g., PIC, stack canaries. Alternative title could be Memory Anti-Exploitation Mechanisms Not Implemented topics: @@ -18,6 +20,7 @@ draft: - stack canaries note: PIC cannot be switched off in newer versions of Android, the NDK does not link against such libraries anymore [source](https://cs.android.com/android/platform/superproject/main/+/main:bionic/linker/linker_main.cpp;l=397?q=linker_main&ss=android%2Fplatform%2Fsuperproject%2Fmain). status: draft - +observed_examples: +- https://nvd.nist.gov/vuln/detail/CVE-2019-3568 ---