And since you bring up Java, I guess JITs are not possible on HA.

Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]


-----Original Message-----
From: Richard M. Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, July 17, 2008 6:40 PM
To: 'Drsolly'; Larry Seltzer
Cc: funsec@linuxbox.org; [EMAIL PROTECTED]
Subject: RE: [funsec] Texas Bank Dumps Antivirus for Whitelisting

Code bytes only get security measures supported by the hardware.  Data
bytes
can be subjected to additional security checks.  For example, a JVM can
implement a security model of its choosing for P-code.  (From the
viewpoint
of the real CPU, P-Code is not instructions but just data bytes that
gets
processed like any other data.)

Richard

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On
Behalf Of Drsolly
Sent: Thursday, July 17, 2008 6:21 PM
To: Larry Seltzer
Cc: funsec@linuxbox.org; [EMAIL PROTECTED]
Subject: Re: [funsec] Texas Bank Dumps Antivirus for Whitelisting

On Thu, 17 Jul 2008, Larry Seltzer wrote:

> >> Harvard architecture, unlike von Neumann architecture, had a strict
> separation of 
> progrma and data store and representation.  It would have been
> impossible for a 
> program to modify its own or other executable material.  Data was not
> executable, 
> so SQL injection and XSS would have been impossible.  (So would a lot
of
> other 
> things, but ...)
> 
> I'm not a real computer scientist, I just play one online, but this
> isn't how I thought it worked. SQL isn't actually executable code,
it's
> just data that program code uses in order to decide what to execute. A
> program in a Harvard architecture is capable of going "if x==1 then
> do_this() else if x==2 then do_that(); etc(),etc(),etc()" - can't it?
> 
> Things like buffer overflows would be impossible with a Harvard
> architecture, but I don't see why SQL injection or Trojan horse
programs
> or many other malicious items would be any less likely.
 
What's the difference between bytes that are executable, and bytes that 
are used by the computer to decide what to do?

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.




_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to