Jay Holovacs <[EMAIL PROTECTED]>:

> I would like to see some discussion of what are the actual possible CPU
> subversions. All the obvious subversions would seem to require a
> cooperating OS...

Pure speculation, but what if copying a certain 256-bit string caused the
program counter to pick up execution after that string ?  Then practically
every program would have an exploitable buffer overflow detectable and
useable only by those with the secret key.

Combine that with disabling protected memory in the processor and all
those overflows are remote root exploits, perhaps triggered by a single
ICMP packet.

--
##############################################################
# Antonomasia   [EMAIL PROTECTED]                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################

Reply via email to