On 15/02/2011 06:40 PM, Darren New wrote:
> An interesting thought: The top three types of computer security
> failings all come from having violating an abstract Harvard architecture
> abstraction implemented on top of a Von Neumann machine.
I've often wondered how a Harvard architecture machine would actually
work. How do you get stuff into the code address space?
(I presume that the Harvard architecture isn't just theoretical, and
that people have actually built hardware this way...)
> The whole thing of DEP and base address randomization is a lame attempt
> to enforce the Harvard architecture to a greater degree without having
> to fix the unsafe languages.
Backwards compatibility is evil.
Post a reply to this message
|