On Thu, Feb 21, 2019 at 8:20 AM Carter Cheng <cartercheng@gmail.com> wrote:
> I was looking over some recent papers for Usenix Security and there are a couple on data oriented programming and I have been wondering if there are known mitigation techniques for this kind of data corruption attack or other attacks that don't involve control flow hijacking.
Can you share some URLs and/or examples? I'm sure other folks here
would be interested to read those too.
--
Kees Cook