From 83fc7c1e9eca8a3abb77266c97acbf07275d2ce0 Mon Sep 17 00:00:00 2001 From: wmat Date: Wed, 10 Apr 2024 09:33:32 -0400 Subject: Fix PMP chapter title. Updated chapter title to "Smepmp" Extension for PMP Enhancements for memory access and execution prevention in Machine mode, Version 1.0.0 --- src/smepmp.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/smepmp.adoc b/src/smepmp.adoc index aa5c58c..8ec0c70 100644 --- a/src/smepmp.adoc +++ b/src/smepmp.adoc @@ -1,5 +1,5 @@ [[smepmp]] -== "Smepmp" Enhancements for memory access and execution prevention on Machine mode, Version 1.0.0 +== "Smepmp" Extension for PMP Enhancements for memory access and execution prevention in Machine mode, Version 1.0.0 === Introduction Being able to access the memory of a process running at a high privileged execution mode, such as the Supervisor or Machine mode, from a lower privileged mode such as the User mode, introduces an obvious attack vector since it allows for an attacker to perform privilege escalation, and tamper with the code and/or data of that process. A less obvious attack vector exists when the reverse happens, in which case an attacker instead of tampering with code and/or data that belong to a high-privileged process, can tamper with the memory of an unprivileged / less-privileged process and trick the high-privileged process to use or execute it. -- cgit v1.1