From mboxrd@z Thu Jan 1 00:00:00 1970 MIME-Version: 1.0 References: In-Reply-To: From: Kees Cook Date: Thu, 21 Feb 2019 09:15:54 -0800 Message-ID: Subject: Re: classes of methods for gaining access to kernel memory Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable To: Carter Cheng Cc: Kernel Hardening List-ID: On Thu, Feb 21, 2019 at 8:20 AM Carter Cheng wrote: > I was looking over some recent papers for Usenix Security and there are a= couple on data oriented programming and I have been wondering if there are= known mitigation techniques for this kind of data corruption attack or oth= er attacks that don't involve control flow hijacking. Can you share some URLs and/or examples? I'm sure other folks here would be interested to read those too. --=20 Kees Cook