Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
jrtc27
4 months ago
|
parent
|
context
|
favorite
| on:
Memory Integrity Enforcement
We actually have ideas for how to combine the two; see section C.5 of
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-987.pdf
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: