Hacker News new | past | comments | ask | show | jobs | submit login

> Unless the attacker is fortunate to find an unprotected function which the compiler missed,

Every instance of the bytes C3, CB, C2 or CA in the executable page could potentially be abused, via carefully-chosen instruction alignment.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: