A week or so ago I wrote about locality of reference in regards to network security, I found some *actual* research done on the topic and wanted to share it: http://www.cert.org/netsa/publications/Nspw2003-gates-locality.pdf I’m still in eager anticipation of the first tool to use locality for malicious activity assesment.
I’ve been kicking this idea around in my head for the last couple of days, trying to decide what to write… Return with me, for a moment, back to the computational hardware class you took in college (if you did take one, don’t worry if you didn’t). Do you remember discussing program/memory flow? How about […]