This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

TM4C129ENCPDT: Binary Security and Stack Canaries

Part Number: TM4C129ENCPDT

Hi Everyone,

We have used above microcontroller TM4C129ENCPDT with TI RTOS in our device , we had a audit for security and vulnerability check , they have mentioned few points regarding Binary file security and about stack canaries ,

Security audit report :

Headline:

Missing Binary Protections - The firmware executing on the  Device has missing binary protections. 

"Steps to Reproduce:
1. Identify any function in the firmware disassembly.
2. In a binary with stack protections enabled, at the beginning of every function, a random variable is pushed onto the stack immediately, and compared against a baseline just before the function returns. Note that behavior is absent in the firmware.
* This indicates the absence of Stack Canaries.
3. Identify any subroutine call or long branch instruction.
4. Note that the destination of the jump is a literal within the binary's address space.
* This indicates the absence of PIE."

The above mentioned steps are given by security audit people , how can implement above topics to my code and please provide if there are any links that i can reffer to and implement.

Thanks in advance

Chiranth