D
Don Y
Guest
I don\'t see anything that I can do in hardware *or* software to
mitigate against such exploits.
Nor, do I see a reliable way of detecting such a possible
exploit -- or an \"unintended\" vulnerability caused by an
unfortunate instruction sequence (which may be generated
by a compiler and, thus, not as obvious to the coder).
Add to the mix SoCs and it seems like all bets are off
even *in* the lab.
Constrain systems to smaller footprints? (ain\'t gonna
happen)
Perhaps harden the OS and watch for access violations as
a side effect of such a manifestation?
mitigate against such exploits.
Nor, do I see a reliable way of detecting such a possible
exploit -- or an \"unintended\" vulnerability caused by an
unfortunate instruction sequence (which may be generated
by a compiler and, thus, not as obvious to the coder).
Add to the mix SoCs and it seems like all bets are off
even *in* the lab.
Constrain systems to smaller footprints? (ain\'t gonna
happen)
Perhaps harden the OS and watch for access violations as
a side effect of such a manifestation?