Mill Computing, Inc. › Forums › The Mill › Architecture › The Belt › Reply To: The Belt
Spot on Peter 🙂
We go to new lengths to prevent vulnerabilities in your programs turning into exploits too. With the hardware-managed call stack and such it would be very difficult for an attacker to make your program unwittingly set up functions to call others at runtime (e.g. return-oriented-programming) too. More in the Security Talk.