Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 22 Feb 2019 03:36:21 +0800
From: Carter Cheng <>
To: Kees Cook <>
Cc: Kernel Hardening <>
Subject: Re: classes of methods for gaining access to kernel memory

One of the papers I had a brief look at is this one-

On Fri, Feb 22, 2019 at 1:16 AM Kees Cook <> wrote:

> On Thu, Feb 21, 2019 at 8:20 AM Carter Cheng <>
> wrote:
> > I was looking over some recent papers for Usenix Security and there are
> a couple on data oriented programming and I have been wondering if there
> are known mitigation techniques for this kind of data corruption attack or
> other attacks that don't involve control flow hijacking.
> Can you share some URLs and/or examples? I'm sure other folks here
> would be interested to read those too.
> --
> Kees Cook

Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.