▲ | nine_k 3 days ago | |||||||
It's all fun and games until somebody else patches the RAM of your device, and sends your money away from your account. More interesting is how to trace and debug code on such a CPU. Because what a debugger often does is exactly patching an executable in RAM, peeks and pokes inside, etc. If such an interface exists, I wonder how is it protected; do you need extra physical wires like JTAG? If it does not, how do you even troubleshoot a program running on the target hardware? | ||||||||
▲ | saagarjha 3 days ago | parent [-] | |||||||
You disable mitigations for those processes. | ||||||||
|