Mill Computing, Inc. Forums The Mill Architecture The Belt Reply To: The Belt

Post count: 98

Spot on Peter 🙂

We go to new lengths to prevent vulnerabilities in your programs turning into exploits too. With the hardware-managed call stack and such it would be very difficult for an attacker to make your program unwittingly set up functions to call others at runtime (e.g. return-oriented-programming) too. More in the Security Talk.