Scribit Marcus Brinkmann dies 06/01/2007 hora 19:20: > Consider a web browser which I want to debug or monitor, for example > using intrusion detection techniques. If the malicious code can hide > in opaque memory, this fails.
Obviously, as I have authority on the memory used by the browser, if he can read/execute it, I can also. If it hands that memory to another process while losing read access to it, I won't be able to read it neither, but the browser cannot execute code in the opaque region. So you still can give the browser a space bank able to opacify and monitor it's code. Transparently, Pierre -- [EMAIL PROTECTED] OpenPGP 0xD9D50D8A
signature.asc
Description: Digital signature
_______________________________________________ L4-hurd mailing list [email protected] http://lists.gnu.org/mailman/listinfo/l4-hurd
