TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Return-Oriented Programming to Bypass Non-Executable Stack Protection

2 点作者 qazpot6 个月前

1 comment

JoeAltmaier6 个月前
This serves to highlight the need to return to a model of computing where the call stack is not addressable by ordinary applications.<p>The &#x27;display&#x27; where arguments and sometimes return values are kept can continue to be done as it is now. It&#x27;s just the return addresses to calls? They are the root of many of the issues plaguing cpu security today.<p>If a separate, un-addressable (except by call and return instructions, indirectly) stack would do much to mitigate Spectre, ROP-oriented hacks and so on.