Switch 2: Tegra T239: Difference between revisions

Moved to page Security_Mitigations.
 
Line 36: Line 36:


There is no memory authentication, however. So in the event of external memory tampering, the CPU will read back garbled plaintext (effectively, random bytes). Although, it should in principle be possible to "replay" earlier values from a particular address.
There is no memory authentication, however. So in the event of external memory tampering, the CPU will read back garbled plaintext (effectively, random bytes). Although, it should in principle be possible to "replay" earlier values from a particular address.
=== XOM (eXecute-Only-Memory) ===
The hardware supports XOM.
Sysmodules have --X .text, at least as of system-version 20.x.
=== CFI (Control-Flow-Integrity) ===
Besides the CFI used by [[Internet_Browser|web-applets]], sysmodules seem to use a version of CFI which validate vtable-ptrs (the value of the ptr, without accessing the data located there).