Date: Fri, 22 Feb 2019 03:36:21 +0800 From: Carter Cheng <cartercheng@...il.com> To: Kees Cook <keescook@...omium.org> Cc: Kernel Hardening <kernel-hardening@...ts.openwall.com> Subject: Re: classes of methods for gaining access to kernel memory One of the papers I had a brief look at is this one- https://ieeexplore.ieee.org/abstract/document/7546545 On Fri, Feb 22, 2019 at 1:16 AM Kees Cook <keescook@...omium.org> wrote: > On Thu, Feb 21, 2019 at 8:20 AM Carter Cheng <cartercheng@...il.com> > wrote: > > I was looking over some recent papers for Usenix Security and there are > a couple on data oriented programming and I have been wondering if there > are known mitigation techniques for this kind of data corruption attack or > other attacks that don't involve control flow hijacking. > > Can you share some URLs and/or examples? I'm sure other folks here > would be interested to read those too. > > -- > Kees Cook > Content of type "text/html" skipped
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.