Conversation

Replying to and
That's starting to change though: so if you compare the median custom allocator against one of the new-ish breed of allocators that takes steps to defend against exploitation, then yeah, custom would probably be easier. Of course, the reverse could also be true: your new ...
2
2
This would be mitigating the “metadata school” speaks of here?
Quote Tweet
Replying to @pati_gallardo
There are different schools of heap exploitation, too. The metadata school focuses on heap metadata and tries to port techniques between applications, the app-specific school focuses on just application objects. I belong to the latter school, but there is no “right” answer.
2
1
The out-of-band metadata also provides security properties like being able to 100% reliably detect any free of an allocation that's not active. It's part of implementing deterministic, direct detection of many memory corruption bugs, not just hindering exploitation with them.
2
4