10.08.2015 Views

EXPLOITING EMBEDDED SYSTEMS THE SEQUEL!

Exploitation - CanSecWest

Exploitation - CanSecWest

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

New Attack Classes - Prevention• Protect vectors from writing via MMU• Remap vectors to high addresses• ARM9 processors – drive HIVECS processor pinHIGH• XSCALE – Set bit 13 of the ARM control register to 1• Vectors will be mapped at 0xffff0000Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!