Linking pages
- Hijacking the control flow of a WebAssembly program | Fastly https://www.fastly.com/blog/hijacking-control-flow-webassembly 4 comments
- Protecting Software Against Exploitation with DARPA’s CFAR | Trail of Bits Blog https://blog.trailofbits.com/2018/09/10/protecting-software-against-exploitation-with-darpas-cfar/ 0 comments
Related searches:
Search whole site: site:blog.trailofbits.com
Search title: Let’s talk about CFI: clang edition | Trail of Bits Blog
See how to search.