| Deutsch English Français Italiano |
|
<bebb9f88a6677b4894478a3dabc8b2c9@www.novabbs.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!i2pn.org!i2pn2.org!.POSTED!not-for-mail From: mitchalsup@aol.com (MitchAlsup1) Newsgroups: comp.arch Subject: Re: ARM is channeling the IBM 360 Date: Thu, 20 Jun 2024 22:55:41 +0000 Organization: Rocksolid Light Message-ID: <bebb9f88a6677b4894478a3dabc8b2c9@www.novabbs.org> References: <s7r87j1c3u6mim0db3ccbdvknvtjr4anu3@4ax.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Info: i2pn2.org; logging-data="645716"; mail-complaints-to="usenet@i2pn2.org"; posting-account="65wTazMNTleAJDh/pRqmKE7ADni/0wesT78+pyiDW8A"; User-Agent: Rocksolid Light X-Spam-Checker-Version: SpamAssassin 4.0.0 X-Rslight-Posting-User: ac58ceb75ea22753186dae54d967fed894c3dce8 X-Rslight-Site: $2y$10$Cn5Vf6pD8CfQyTj0BBEgMOKlrHicT6IAYJRH.rqtr2JZ90sQJ4k0q Bytes: 1496 Lines: 18 John Savard wrote: > I saw this article about a memory-proitection mechanism on ARM that > has been bypassed... > https://www.techspot.com/news/103440-researchers-crack-arm-memory-safety-mechanism-achieve-95.html > and I was struck by how similar it sounds to the memory keys used on > the 360. Apparently good enough to 'help' debug, but insufficient to add any real security. probably "not enough bits" The 4 seconds part leads me to believe the attackers are using brute force, since in 4 seconds one can try something like 2^28 patterns. > John Savard