A levelez�m azt hiszi, hogy Michal Zalewski a k�vetkez�eket �rta:
> 
> We are proud to announce our new security paper, "Delivering signals for
> fun and profit". This paper is an attempt to discuss security aspects of
[]
> For your convenience, it is attached to this message as well (20 kB). Your
> feedback would be greatly appreciated.

Hi!

Is there any known exploit against real programs using this technique?
The technique seems to work in a very low probability level due to
the timing issues. But the first thing I have learned reading bugtraq
is that if something is even remotely and theoretically exploitable,
someone is using the technique for years already (and openbsd have
fixed it two years ago:).

Reply via email to