top | item 39475412

(no title)

X-Cubed | 2 years ago

One approach is to copy the data to a location that you control first (eg: RAM) and perform both the check and the use of that data from the trusted location. That can be difficult though on embedded devices with constrained resources.

discuss

order

No comments yet.