> On Apr 5, 2016, at 1:04 PM, Matthew Flatt <mfl...@cs.utah.edu> wrote: > > I think Racket offers so many ways to turn data into > code that an attacker probably shouldn't bother with techniques to find > pages of memory that are specific to JIT and libffi generation. (I do > see how W^X could be useful for securing some programs, though.)
Just to make sure in public that this isn’t a Racket-soecific thing, almost any practical language has such reflective capabilities and allows jumps to executable code. [Still waiting for the verified compiler guys to look at reflective methods.] — Matthias -- You received this message because you are subscribed to the Google Groups "Racket Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to racket-users+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.