"Branch-based ROP Mitigations (Hardware
Augmented)
ROP attacks can be achieved by leveraging an unused hardware feature in mainstream Intel® processors (from 2008 and newer) to track code execution and augment the analysis and detection of advanced exploit attacks at run time. Employing read-only hardware-traced (branch) records has a significant security benefit over software stack-based approaches. The branch information that can be retrieved from these records not only identifies the target of the branch, but also the source. So it actually shows where the change in control-flow originated from. This specific information cannot be obtained with the same level of confidence using a stack-based solution.
Branch information in the hardware-traced records cannot be manipulated; there’s no way for it to be overwritten with controlled data by an attacker. Stack-based solutions (like Microsoft EMET and Palo Alto Networks Traps) rely on stack data, which is – especially in case of a ROP attack – under control of the attacker, who in turn can mislead the defender. In contrast, the hardware-traced data examined by Sophos Intercept X is more reliable and tamper resistant.
Sophos Intercept X will automatically employ Intel MSR hardware registers when it detects an Intel® Core™ i3, i5, or i7 processor (CPU). If the endpoint does not have a supported processor, Sophos Intercept X will automatically fall-back on software-only stack-based control-flow integrity checks."