This preview shows page 1. Sign up to view the full content.
Unformatted text preview: used when. For this reason, I feel that the software is easier to check for undocumented features, because with the hardware, there really isnt a good way for me to trace its execution. 3. This is impossible because a computer cant possibly comprehend what is a trapdoor and what is an intended feature of a program. 4. The program may set the values of k and n to 1 and 10 respectively, but the re-usable routine that is called may be passed different values (like k+4 and n+11). Also after k and n are set, they may be accessed in memory and changed to 5 and 21. 5. Confinement would make it so that no other process would have access to either the location in the program where the routine is called. Confinement would also prevent other processes from manipulating the memory locations where k and n are set and stored....
View Full Document
- Spring '10