lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <42EA7C85.9070608@csuohio.edu> Date: Fri Jul 29 20:00:54 2005 From: michael.holstein at csuohio.edu (Michael Holstein) Subject: Cisco IOS Shellcode Presentation > How about adopting an architecture that incorporates special-purpose > security safeguards into the CPU? Routers and switches don't need to > execute arbitrary code, Cisco knows ahead of time, before they deploy a > product, what code that product should be allowed to execute. But how many times over the years has a IOS upgrade added a useful feature? .. securing the physical hardware to not accept new (aka: 'arbitrary') code would make a *lot* of rack-mount paperweights.
Powered by blists - more mailing lists