|
Message-ID: <CAGXu5jJ11jw=RZ1X_KT7+9f_vjrvEpjADxdqedKLxSQjreG8Tw@mail.gmail.com> Date: Thu, 21 Feb 2019 09:15:54 -0800 From: Kees Cook <keescook@...omium.org> To: Carter Cheng <cartercheng@...il.com> Cc: Kernel Hardening <kernel-hardening@...ts.openwall.com> Subject: Re: classes of methods for gaining access to kernel memory On Thu, Feb 21, 2019 at 8:20 AM Carter Cheng <cartercheng@...il.com> wrote: > I was looking over some recent papers for Usenix Security and there are a couple on data oriented programming and I have been wondering if there are known mitigation techniques for this kind of data corruption attack or other attacks that don't involve control flow hijacking. Can you share some URLs and/or examples? I'm sure other folks here would be interested to read those too. -- Kees Cook
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.