memory tagging should be a game changer for C and C++; get with the program, @intel and @apple!!pic.twitter.com/z2vXAtTb7z
U tweetove putem weba ili aplikacija drugih proizvođača možete dodati podatke o lokaciji, kao što su grad ili točna lokacija. Povijest lokacija tweetova uvijek možete izbrisati. Saznajte više
Yes @lazytyped worked on this for sparc. It really is worth it.
Yep. Even if folks are critical of the limits of 4 bits for UAF protection, completely eliminating all stack, heap, data/bss, and tls based buffer overflows is huge.
Sequential buffer overflows (out of object) are completely impossible. Attack of heap metadata is impossible without ability to craft upper ptr bits. Clobbering new object via UAF is impossible to prevent 100% but statistically very likely to trap.
…unless the attacker can get the tag of the freed area somehow, which is one instruction away. That’s the scary part.
I keep hearing this and I feel like I'm missing something. What classes does it completely close off? The 4-bit tags seem ridiculously easy to bypass to a motivated attacker.
I don’t think it’s ridiculously easy to bypass. How do you get the tag from, say, attacker controlled JavaScript? That said, I’m not yet on board the MTE hype train, because I’m worried about leaking tags.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.