diff options
author | wmat <wmat@riscv.org> | 2024-04-09 15:41:33 -0400 |
---|---|---|
committer | wmat <wmat@riscv.org> | 2024-04-09 15:41:33 -0400 |
commit | 9cd40830f7c137cc093c94723574410620731a06 (patch) | |
tree | 18522043738eb6b0698a0d5e1abab5011c59f2f0 /src/smepmp.adoc | |
parent | d125ebd61769cefce9f4327aa839a65018a84975 (diff) | |
download | riscv-isa-manual-9cd40830f7c137cc093c94723574410620731a06.zip riscv-isa-manual-9cd40830f7c137cc093c94723574410620731a06.tar.gz riscv-isa-manual-9cd40830f7c137cc093c94723574410620731a06.tar.bz2 |
Cleaning up version numbers.
Adding missing version numbers.
Diffstat (limited to 'src/smepmp.adoc')
-rw-r--r-- | src/smepmp.adoc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/smepmp.adoc b/src/smepmp.adoc index 44142d4..aa5c58c 100644 --- a/src/smepmp.adoc +++ b/src/smepmp.adoc @@ -1,5 +1,5 @@ [[smepmp]] -== "Smepmp" Enhancements for memory access and execution prevention on Machine mode +== "Smepmp" Enhancements for memory access and execution prevention on Machine mode, Version 1.0.0 === Introduction Being able to access the memory of a process running at a high privileged execution mode, such as the Supervisor or Machine mode, from a lower privileged mode such as the User mode, introduces an obvious attack vector since it allows for an attacker to perform privilege escalation, and tamper with the code and/or data of that process. A less obvious attack vector exists when the reverse happens, in which case an attacker instead of tampering with code and/or data that belong to a high-privileged process, can tamper with the memory of an unprivileged / less-privileged process and trick the high-privileged process to use or execute it. |