Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Right. But in practice ROP targets the executable portions - any and all of them. If someone leaves something executable that they shouldn't, it'll use that. If only code is left executable, it's still often able to use that.

Remember, x86 can be parsed differently depending on offset. You jump into the middle of a multibyte instruction you get an entirely different instruction stream. And x86 doesn't have any real protection against that.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: