Deutsch   English   Français   Italiano  
<bebb9f88a6677b4894478a3dabc8b2c9@www.novabbs.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: mitchalsup@aol.com (MitchAlsup1)
Newsgroups: comp.arch
Subject: Re: ARM is channeling the IBM 360
Date: Thu, 20 Jun 2024 22:55:41 +0000
Organization: Rocksolid Light
Message-ID: <bebb9f88a6677b4894478a3dabc8b2c9@www.novabbs.org>
References: <s7r87j1c3u6mim0db3ccbdvknvtjr4anu3@4ax.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: i2pn2.org;
	logging-data="645716"; mail-complaints-to="usenet@i2pn2.org";
	posting-account="65wTazMNTleAJDh/pRqmKE7ADni/0wesT78+pyiDW8A";
User-Agent: Rocksolid Light
X-Spam-Checker-Version: SpamAssassin 4.0.0
X-Rslight-Posting-User: ac58ceb75ea22753186dae54d967fed894c3dce8
X-Rslight-Site: $2y$10$Cn5Vf6pD8CfQyTj0BBEgMOKlrHicT6IAYJRH.rqtr2JZ90sQJ4k0q
Bytes: 1496
Lines: 18

John Savard wrote:

> I saw this article about a memory-proitection mechanism on ARM that
> has been  bypassed...

> https://www.techspot.com/news/103440-researchers-crack-arm-memory-safety-mechanism-achieve-95.html

> and I was struck by how similar it sounds to the memory keys used on
> the 360.

Apparently good enough to 'help' debug, but insufficient to add any real
security.
probably "not enough bits"

The 4 seconds part leads me to believe the attackers are using brute
force, since
in 4 seconds one can try something like 2^28 patterns.

> John Savard