TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Return-Oriented Programming to Bypass Non-Executable Stack Protection

2 pointsby qazpot6 months ago

1 comment

JoeAltmaier6 months ago
This serves to highlight the need to return to a model of computing where the call stack is not addressable by ordinary applications.<p>The &#x27;display&#x27; where arguments and sometimes return values are kept can continue to be done as it is now. It&#x27;s just the return addresses to calls? They are the root of many of the issues plaguing cpu security today.<p>If a separate, un-addressable (except by call and return instructions, indirectly) stack would do much to mitigate Spectre, ROP-oriented hacks and so on.