Map
Index
Random
Help
th

Quote: the subverter frequently sampled the security sensitive hardware; identified code that allowed illegal access to a protected segment; was due to a field modification

topics > all references > references i-l > QuoteRef: kargPA6_1974 , p. 131



Topic:
security leaks and weaknesses

Quotation Skeleton

One area of significant concern in a system … To attempt a gross measure of the rate … sensitive hardware on a frequent basis, testing for … [p. 132] a sequence of code was observed which … certain cases described below would permit the executed … … The exact layout of instructions and indirect words … the error [was apparently] introduced in a field modification …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: security leaks and weaknesses (56 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.