How much memory manipulation is possible?

2008-04-29 Thread Shachar Shemesh
Hi all, I have a question that touches on the security of a new tool I am thinking of writing. In order to understand the threats, I need to know the following. Supposing I have a process that does the following: * Create a temporary file and open it read-only. * Map that file into memory

Re: How much memory manipulation is possible?

2008-04-29 Thread Gilad Ben-Yossef
Shachar Shemesh wrote: Hi all, I have a question that touches on the security of a new tool I am thinking of writing. In order to understand the threats, I need to know the following. Supposing I have a process that does the following: * Create a temporary file and open it read-only. *

Re: How much memory manipulation is possible?

2008-04-29 Thread Shachar Shemesh
Gilad Ben-Yossef wrote: Are there any side effects to writing to this read only memory? Terminology - with no limitation to the generality of what we are trying to discuss here, let's call the program we don't trust skype, and the program that does the magic jail. These are random hypothetical