Re: [dev-servo] State of Servo

2012-07-25 Thread Brendan Eich
Leo Meyerovich wrote: Meant to ask earlier -- for SFI/CFI: -- How is JIT'd code handled? E.g., the JIT also outputs instrumented code and we trust whoever ran the JIT? We have had some work on hardening SpiderMonkey against JIT-spraying techniques but we have not done anything to try to gene

Re: [dev-servo] State of Servo

2012-07-25 Thread Leo Meyerovich
Meant to ask earlier -- for SFI/CFI: -- How is JIT'd code handled? E.g., the JIT also outputs instrumented code and we trust whoever ran the JIT? -- Are return-to-libc attacks in the threat model or is that too academic? A seemingly realistic example of return-to-libc would tricking the browser