Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Just elaborating on this. One way of looking at it is that we turn the attacked program into an interpreter thus bypassing the requirement for executability.

It turns out that a lot of programs can be tricked into interpreting a family of languages called rop chains.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: