On Wednesday 23 August 2006 21:06, Scott Quinn wrote:
Don stated
And you have to ensure that there is *no* way the
user can
execute code *before* your interpreter/virtual machine/etc.
gains control of the CPU. I.e., at the very least, you
need physical control over the machine. This isnt possible
in all cases (e.g., a consumer device!)
You can make it very difficult, though.
The X-box uses cryptographic hashes, the AS/400 uses completely
undocumented (in the public sphere) hardware instructions.
For the AS/400, it's *used to*... Newer AS/400 and iSeries boxes use PowerPC
microprocessors, for which the ISA documentation is readily available. You
may not be able to easily execute PowerPC instructions under OS/400 (or iOS),
but you can also run Linux on them now (which IBM even supports).
Well, and it's fairly easy to defeat the old X-box's security if you want to
spend some $$$ on a kit and time with a soldering iron (or have the right
game with a buffer overflow vulnerability :).
Pat
--
Purdue University ITAP/RCAC ---
http://www.rcac.purdue.edu/
The Computer Refuge ---
http://computer-refuge.org