|Informative Information for the Uninformed
Next: Picking the Time to Up: Temporal Return Addresses Previous: Determining Per-byte Durations   Contents
Once a set of temporal addresses has been located, the next logical step is to attempt to calculate the windows of time that one or more viable opcodes can be found within the bytes of the temporal address. It is also just as important to calculate the duration of each byte within the temporal address. This is the type of information that is required in order to determine when a portion of a temporal address can be used as a return address for an exploit. The approach taken to accomplish this is to make use of the equations provided in the previous chapter for calculating the number of seconds it takes for each byte to change based on the update period for a given temporal address. By using the tosec function for each byte index, a table can be created as illustrated in figure for a 100nanosecond 8 byte timer.