Comment by dwattttt
4 hours ago
> The alternative they present is arguably less secure because the function pointer will remain writable for the life of the process
They also suggest an alternative to storing the function pointer, store the bit flags that decide which function to call. That restricts the call targets to only the legitimate ones intended.
No comments yet
Contribute on Hacker News ↗