Historias
Slashboxes
Comentarios
 
Este hilo ha sido archivado. No pueden publicarse nuevos comentarios.
Mostrar opciones Umbral:
Y recuerda: Los comentarios que siguen pertenecen a las personas que los han enviado. No somos responsables de los mismos.
  • Re:Eso va a ser

    (Puntos:0, Redundante)
    por desas3 (26637) el Miércoles, 10 Diciembre de 2008, 19:57h (#1107171)
    ( Última bitácora: Viernes, 29 Octubre de 2010, 09:43h )
    Directamente del post en el Google On line security blog [blogspot.com]

    Our approach is built around a software containment system called the inner-sandbox that is designed to prevent unintended interactions between a native code module and the host system. The inner-sandbox uses static analysis to detect security defects in untrusted x86 code. Previously, such analysis has been challenging due to such practices as self-modifying code and overlapping instructions. In our work, we disallow such practices through a set of alignment and structural rules that, when observed, enable the native code module to be disassembled reliably and all reachable instructions to be identified during disassembly. With reliable disassembly as a tool, it's then feasible for the validator to determine whether the executable includes unsafe x86 instructions.
    --
    Este comentario ha sido escrito en Google Chrome dev Build para Linux a partir de electrones 100% reciclados.
    [ Padre ]
    Puntos de inicio:    1  punto
    Moderación   -1  
    Modificador extra 'Redundante'   0  

    Total marcador:   0