Scribit Marcus Brinkmann dies 06/01/2007 hora 19:20:
> Consider a web browser which I want to debug or monitor, for example
> using intrusion detection techniques.  If the malicious code can hide
> in opaque memory, this fails.

Obviously, as I have authority on the memory used by the browser, if he
can read/execute it, I can also. If it hands that memory to another
process while losing read access to it, I won't be able to read it
neither, but the browser cannot execute code in the opaque region.

So you still can give the browser a space bank able to opacify and
monitor it's code.

Transparently,
Pierre
-- 
[EMAIL PROTECTED]
OpenPGP 0xD9D50D8A

Attachment: signature.asc
Description: Digital signature

_______________________________________________
L4-hurd mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/l4-hurd

Reply via email to