Line 9:
Line 9:
* Garbage collector
* Garbage collector
* Catch SIGSEGV, do smth with mappings and act upon "illegal" memory access
* Catch SIGSEGV, do smth with mappings and act upon "illegal" memory access
+
** Remote swap for task
+
** WSS detction
Another is to do some activity on the victim and then just unload. With this we can
Another is to do some activity on the victim and then just unload. With this we can