I don't know anything about this stuff really, is there a good primer that's readable?
-
-
-
I think easiest is to find a video of a Kostya talk
Kraj razgovora
Novi razgovor -
-
-
We cannot allow a memory tagging gap with the Russians! (Modern Elbrus has it too)pic.twitter.com/jAXHH1mZXR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
I'm going to be that jerkface and predict that MTE won't do all that much. It's a pretty weak mitigation that requires a lot of work to adopt.
-
It is not (only) a (weak) mitigation - it is a tool to discover bugs and vulnerabilities in the field. Testing - including smart fuzzing - does not find all memory access defects. But if MTE information is collected IN THE FIELD you find these defects and with absolute precision
- Još 3 druga odgovora
Novi razgovor -
-
-
I’ve got more hope for RISC-V
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
It is certainly popular with
@DARPA SSITH performers! Learn more at https://securehardware.org@galoisHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.