Skip site navigation (1)Skip section navigation (2)
Date:      26 Jun 2003 22:09:45 -0000
From:      "D. J. Bernstein" <djb@cr.yp.to>
To:        freebsd-performance@freebsd.org
Subject:   sacrificing performance for confusion
Message-ID:  <20030626220945.75399.qmail@cr.yp.to>

next in thread | raw e-mail | index | archive | help
> Using VMM protection to forbid code execution within the DATA, BSS, heap,
> and stack (if one can) mitigates against a common class of problems--

I don't believe you. Show me a real program that's (1) vulnerable if
data/bss/heap/stack are executable and (2) invulnerable otherwise.

Yes, attacks are often written to take advantage of executable stacks;
but, in every case I've investigated, the programs would still have been
vulnerable with non-executable stacks.

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030626220945.75399.qmail>