<div dir="ltr"><div class="gmail_extra"><br><div class="gmail_quote">On Mon, Jan 5, 2015 at 7:45 PM, PaX Team <span dir="ltr"><<a href="mailto:pageexec@gmail.com" target="_blank">pageexec@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">On 5 Jan 2015 at 19:19, Chandler Carruth wrote:<br>
<br>
> On Mon, Jan 5, 2015 at 7:13 PM, PaX Team <<a href="mailto:pageexec@gmail.com">pageexec@gmail.com</a>> wrote:<br>
><br>
> > that's exactly what i'm wondering about: what is that class of attacks?<br>
> > blind ROP can discover gadgets remotely without knowing the exact code<br>
> > content.<br>
> ><br>
><br>
> I'm not a security expert, but I would imagine that blind ROP is somewhat<br>
> harder / more difficult / more expensive than ROP.<br>
<br>
</span>that's why it's worth reading the paper as they provide numbers ;). the attacker's<br>
cost is quite economical, say a few thoudand tries (obviously this requires a<br>
respawning service, e.g., this won't work against a browser, but there're other<br>
ways for that case). now if everyone had brute force prevention like grsecurity<br>
we'd be talking about a different cost model...</blockquote></div><br>Is it not reasonable to provide this kind of tool for the folks who do have such prevention mechanisms?</div><div class="gmail_extra"><br></div><div class="gmail_extra">We're just tool vendors here. We're not endorsing or enshrining any of these tools.</div></div>