Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion book.md
Original file line number Diff line number Diff line change
Expand Up @@ -1577,7 +1577,7 @@ In the previous sections, we have focused on subverting control flow by
overwriting [control data]{.index}, which are used to change the value of the
program counter, such as return addresses and function pointers. Since these
types of attacks are prominent, many mitigations have been designed with the
goal of maintaining control-flow integrity. [Non-control data attacks]{.index}
goal of maintaining control-flow integrity. [Non-control data attacks]{.index
entry="non-control data attacks"}, also known as [data-only attacks]{.index},
can completely bypass these mitigations, since the data they modify is not the
control data that these mitigations protect.
Expand Down
Loading