Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGXu5jJ11jw=RZ1X_KT7+9f_vjrvEpjADxdqedKLxSQjreG8Tw@mail.gmail.com>
Date: Thu, 21 Feb 2019 09:15:54 -0800
From: Kees Cook <keescook@...omium.org>
To: Carter Cheng <cartercheng@...il.com>
Cc: Kernel Hardening <kernel-hardening@...ts.openwall.com>
Subject: Re: classes of methods for gaining access to kernel memory

On Thu, Feb 21, 2019 at 8:20 AM Carter Cheng <cartercheng@...il.com> wrote:
> I was looking over some recent papers for Usenix Security and there are a couple on data oriented programming and I have been wondering if there are known mitigation techniques for this kind of data corruption attack or other attacks that don't involve control flow hijacking.

Can you share some URLs and/or examples? I'm sure other folks here
would be interested to read those too.

-- 
Kees Cook

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.