aboutsummaryrefslogtreecommitdiff
path: root/src/smepmp.adoc
diff options
context:
space:
mode:
Diffstat (limited to 'src/smepmp.adoc')
-rw-r--r--src/smepmp.adoc2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/smepmp.adoc b/src/smepmp.adoc
index 547f723..8ec0c70 100644
--- a/src/smepmp.adoc
+++ b/src/smepmp.adoc
@@ -1,5 +1,5 @@
[[smepmp]]
-== PMP Enhancements for memory access and execution prevention on Machine mode (Smepmp)
+== "Smepmp" Extension for PMP Enhancements for memory access and execution prevention in Machine mode, Version 1.0.0
=== Introduction
Being able to access the memory of a process running at a high privileged execution mode, such as the Supervisor or Machine mode, from a lower privileged mode such as the User mode, introduces an obvious attack vector since it allows for an attacker to perform privilege escalation, and tamper with the code and/or data of that process. A less obvious attack vector exists when the reverse happens, in which case an attacker instead of tampering with code and/or data that belong to a high-privileged process, can tamper with the memory of an unprivileged / less-privileged process and trick the high-privileged process to use or execute it.