Download now Free registration required
Interfaces get richer, and dirtier, and nastier, over time. Interface design flaws are widespread, from the world of cryptoprocessors through sundry embedded systems right through to antivirus software and the operating system itself. Wherever trusted software talks to less trusted software, the interface is likely to leak more than the designer of the trusted software intended. Failures tend to arise from complexity. The author discusses two main case histories - cryptoprocessors, which accumulate transactions beyond the designers' ability to understand their interactions, and system call wrappers, which try to audit and filter the calls made to an operating system's API.
- Format: PDF
- Size: 295.9 KB