Re: Self-modifying code, Function pointers & { Safety, Security}

Terrence Enger <tenger@iseries-guru.com>
Sat, 15 Mar 2014 09:29:55 -0400

          From comp.compilers

Related articles
Self-modifying code, Function pointers & { Safety, Security} seimarao@gmail.com (Seima Rao) (2014-03-07)
Re: Self-modifying code, Function pointers & { Safety, Security} kaz@kylheku.com (Kaz Kylheku) (2014-03-09)
Re: Self-modifying code, Function pointers & { Safety, Security} martin@gkc.org.uk (Martin Ward) (2014-03-14)
Re: Self-modifying code, Function pointers & { Safety, Security} tenger@iseries-guru.com (Terrence Enger) (2014-03-15)
Re: Self-modifying code, Function pointers & { Safety, Security} seimarao@gmail.com (2014-03-20)
Re: Self-modifying code, Function pointers & { Safety, Security} federation2005@netzero.com (2014-04-13)
Re: Self-modifying code, Function pointers & { Safety, Security} monnier@iro.umontreal.ca (Stefan Monnier) (2014-04-16)
| List of all articles for this month |
From: Terrence Enger <tenger@iseries-guru.com>
Newsgroups: comp.compilers
Date: Sat, 15 Mar 2014 09:29:55 -0400
Organization: Compilers Central
References: 14-03-015 14-03-016
Keywords: code, comment
Posted-Date: 15 Mar 2014 10:17:22 EDT

Kaz Kylheku <kaz@kylheku.com> wrote (with blank lines snipped to keep
the email-filter happy):
> On 2014-03-07, Seima Rao <seimarao@gmail.com> wrote:
> > We are used to separation of code from data at the language level.
[snip Kaz's response]
> > However, two features disupt security :
> > i) self-modifying code
> > i.e. writing to code space
> Note that loading an executable on any operating system constitutes
> the above.


I believe that the IBM system/i is an exception to that general rule.
Only the operating system can write to the code space of a program
object. This *does* contribute to the security of the system.
[Burroughs mainframes have done that since the 1960s. I wouldn't put
too much faith in the security implications though; I once saw a demo
of hacking computerized voting machines even though all of the code
was in ROM. They constructed a stack with pointers to bits of
routines that could be exploited, and then just did a return. -John]


Post a followup to this message

Return to the comp.compilers page.
Search the comp.compilers archives again.