|
|
|
⇒
A malicious program can use operating system calls to read and write any data that the storage system is capable of reading and writing. Because read and write calls for both the program and the storage system run in the same address space, the operating system can not distinguish them.
What did the asteroid that killed the dinosaurs say? “T. rex, I’m coming for my hug!” |