Hi all,
I have a question that touches on the security of a new tool I am
thinking of writing. In order to understand the threats, I need to know
the following. Supposing I have a process that does the following:
* Create a temporary file and open it read-only.
* Map that file into memory
Shachar Shemesh wrote:
Hi all,
I have a question that touches on the security of a new tool I am
thinking of writing. In order to understand the threats, I need to know
the following. Supposing I have a process that does the following:
* Create a temporary file and open it read-only.
*
Gilad Ben-Yossef wrote:
Are there any side effects to writing to this read only memory?
Terminology - with no limitation to the generality of what we are trying
to discuss here, let's call the program we don't trust skype, and the
program that does the magic jail. These are random hypothetical