Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CALS6=qWmGCy5Q51_pEvY9HWADfSTa_W25cNHSmmCLfmdXG6E4g@mail.gmail.com>
Date: Fri, 22 Feb 2019 03:36:21 +0800
From: Carter Cheng <cartercheng@...il.com>
To: Kees Cook <keescook@...omium.org>
Cc: Kernel Hardening <kernel-hardening@...ts.openwall.com>
Subject: Re: classes of methods for gaining access to kernel memory

One of the papers I had a brief look at is this one-

https://ieeexplore.ieee.org/abstract/document/7546545



On Fri, Feb 22, 2019 at 1:16 AM Kees Cook <keescook@...omium.org> wrote:

> On Thu, Feb 21, 2019 at 8:20 AM Carter Cheng <cartercheng@...il.com>
> wrote:
> > I was looking over some recent papers for Usenix Security and there are
> a couple on data oriented programming and I have been wondering if there
> are known mitigation techniques for this kind of data corruption attack or
> other attacks that don't involve control flow hijacking.
>
> Can you share some URLs and/or examples? I'm sure other folks here
> would be interested to read those too.
>
> --
> Kees Cook
>

Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.