Ye edited subsection_Motivation_System_and_high__.tex  about 8 years ago

Commit id: 3e47511e3377c576a0dbcba11e9c85c667d1ca12

deletions | additions      

       

Based on the observation that JOP uses many libraries that makes system calls, De Raadt proposed a new mitigation technique against control-flow attacks _Pledge_\cite{pledge} for the OpenBSD operating system. To reduce the attack surface, programmers can annotate their program with pledge\cite{pledge(2)} requests to limit the number of systems calls a program can make. When running a pledged program, the kernel can enforce the pledge annotations and report an error if the program attempts to make system call that is not allowed. Figure 1 shows the example of how the _cat_ program is annotated in OpenBSD.  \begin{lstlisting}[caption=cat.c] \begin{lstlisting}[,caption= {"cat.c in OpenBSD"}]  int main() {  int ch;