This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: are being used when. For this reason, I feel that the software is easier to check for undocumented features, because with the hardware, there really isn’t a good way for me to trace its execution. 3. This is impossible because a computer can’t possibly “comprehend” what is a trapdoor and what is an intended feature of a program. 4. The program may set the values of k and n to 1 and 10 respectively, but the re-usable routine that is called may be passed different values (like k+4 and n+11). Also after k and n are set, they may be accessed in memory and changed to 5 and 21. 5. Confinement would make it so that no other process would have access to either the location in the program where the routine is called. Confinement would also prevent other processes from manipulating the memory locations where k and n are set and stored....
View Full Document
This note was uploaded on 04/20/2010 for the course CECS 478 taught by Professor Englert during the Spring '10 term at CSU Long Beach.
- Spring '10