jatar_k - 12:47 pm on Mar 26, 2010 (gmt 0)
this is awesome
The iPhone's code signing mechanism requires code loaded into memory to carry a valid digital signature before it can be executed. To get around it, the researchers used a technique known as return-oriented programming, which takes pieces of valid code and rearranges them to form the malicious payload.
hadn't heard of that before, mind blowing concept, great article. I like the fella arriving at the conf with 20 working hacks for safari. It sounds like Apple got it the worst.