Assignment4 - are being used when. For this reason, I feel...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Andrew Maselli October 28, 2008 CECS 478 Homework #4 I, Andrew Maselli, pledge that this is my own independent work, which conforms to the guidelines of academic honesty as described in the course syllabus. 1. I would try several things to attempt to discover undocumented feature of the processor. First I would try to execute all the undefined opcodes (the ones which were not listed as valid opcodes in the technical reference manual). I would also try out of bounds operands/illegal operations. 2. The task is similar to the previous one because I am trying to cause the program to do something it isn’t supposed to do (like I was trying to make the processor do something it wasn’t supposed to do.) Like before, a big part of my strategy is going to be passing fringe/out of bound inputs. It is also very different though, because with software I can trace through a programs execution so I can tell which parts of a program
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: are being used when. For this reason, I feel that the software is easier to check for undocumented features, because with the hardware, there really isn’t a good way for me to trace its execution. 3. This is impossible because a computer can’t possibly “comprehend” what is a trapdoor and what is an intended feature of a program. 4. The program may set the values of k and n to 1 and 10 respectively, but the re-usable routine that is called may be passed different values (like k+4 and n+11). Also after k and n are set, they may be accessed in memory and changed to 5 and 21. 5. Confinement would make it so that no other process would have access to either the location in the program where the routine is called. Confinement would also prevent other processes from manipulating the memory locations where k and n are set and stored....
View Full Document

This note was uploaded on 04/20/2010 for the course CECS 478 taught by Professor Englert during the Spring '10 term at CSU Long Beach.

Page1 / 2

Assignment4 - are being used when. For this reason, I feel...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online