Date: 26 Jun 2003 22:09:45 -0000 From: "D. J. Bernstein" <djb@cr.yp.to> To: freebsd-performance@freebsd.org Subject: sacrificing performance for confusion Message-ID: <20030626220945.75399.qmail@cr.yp.to>
next in thread | raw e-mail | index | archive | help
> Using VMM protection to forbid code execution within the DATA, BSS, heap, > and stack (if one can) mitigates against a common class of problems-- I don't believe you. Show me a real program that's (1) vulnerable if data/bss/heap/stack are executable and (2) invulnerable otherwise. Yes, attacks are often written to take advantage of executable stacks; but, in every case I've investigated, the programs would still have been vulnerable with non-executable stacks. ---D. J. Bernstein, Associate Professor, Department of Mathematics, Statistics, and Computer Science, University of Illinois at Chicago
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030626220945.75399.qmail>