Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

No, it was proprietary code, and it wasn't for an Intel processor. It was a pure software approach, but the particular (embedded) environment made it harder to attack the shadow stack itself.

I had a pretty cool optimization that I don't think anyone's figured out yet. Oh well. That's the downside of software-as-trade-secrets.



Can you name it, so we can find it ourselves? ;)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: