RE: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread Chris Wysopal
On Wed, 14 Dec 2005, ljknews wrote: > At 9:14 AM -0500 12/14/05, Gary McGraw wrote: > > No, that's a copy of stackguard. The real problem with all of these > > approaches is that they don't fix the root problem. Finding and removing > > buffer overflow conditions with a static analysis tool is

RE: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread Gary McGraw
Ah yes. Type safety to all, and to all a good night. gem -Original Message- From: ljknews [mailto:[EMAIL PROTECTED] Sent: Wed Dec 14 11:36:20 2005 To: Secure Coding Mailing List Subject:RE: [SC-L] Intel turning to hardware for rootkit detection At 9:14 AM -0500 12/14

RE: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread ljknews
At 9:14 AM -0500 12/14/05, Gary McGraw wrote: > No, that's a copy of stackguard. The real problem with all of these > approaches is that they don't fix the root problem. Finding and removing > buffer overflow conditions with a static analysis tool is far superior. But still better is using a pro

RE: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread Gary McGraw
lto:[EMAIL PROTECTED] Sent: Wed Dec 14 09:03:55 2005 To: 'Secure Coding Mailing List' Subject: RE: [SC-L] Intel turning to hardware for rootkit detection Isn't Smashguard the same technology (in software) added to the latest Microsoft .NET compiler and run time? While protect

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread ljknews
At 1:33 AM -0800 12/14/05, Crispin Cowan wrote: > Smashguard, if I recall correctly, offers approximately the protection > of existing compiler methods, but with the added fun of requiring > modified (non-existent) hardware. > > The referenced hardware in the IEEE article and the intel.com pages >

RE: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread Michael S Hines
the Admin side. ---Michael S Hines[EMAIL PROTECTED]   From: mudge [mailto:[EMAIL PROTECTED] Sent: Tuesday, December 13, 2005 6:01 PMTo: Hines, Michael S.Cc: 'Secure Coding Mailing List'Subject: Re: [SC-L] Intel turning to hardware for rootkit detection There was a lady

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread Crispin Cowan
Smashguard, if I recall correctly, offers approximately the protection of existing compiler methods, but with the added fun of requiring modified (non-existent) hardware. The referenced hardware in the IEEE article and the intel.com pages appears to be some descendant of Palladium; it is a hardwar

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread Greenarrow 1
AIL PROTECTED]> To: "Kenneth R. van Wyk" <[EMAIL PROTECTED]> Cc: "Secure Coding Mailing List" Sent: Tuesday, December 13, 2005 9:28 AM Subject: Re: [SC-L] Intel turning to hardware for rootkit detection > On 12/13/05, Kenneth R. van Wyk <[EMAIL PROTECTED]>

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread Gadi Evron
http://www.eweek.com/article2/0,1895,1900533,00.asp Gee this sounds just like virus wars, using add-on products to make up for weakness in the operating system. A reliable operating system would not permit such modifications in the first place Whatever happened with Intel NX technology? Any

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread mudge
There was a lady who went to Purdue, I believe her name was Carla Brodley. She is a professor at Tufts currently. One of her projects, I'm not sure whether it is ongoing or historic, was surrounding hardware based stack protection. There wasn't any protection against heap / pointer overflows and I

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread David Eisner
Ron Forrester wrote: On 12/13/05, Kenneth R. van Wyk <[EMAIL PROTECTED]> wrote: The detection mechanism seems to primarily be looking primarily for non-OS software modifying OS inhabited memory blocks. Wonder how they're definining (and maintaining the definition) of each... I also wonder h

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread ljknews
At 9:28 AM -0800 12/13/05, Ron Forrester wrote: > On 12/13/05, Kenneth R. van Wyk <[EMAIL PROTECTED]> wrote: >> The detection mechanism seems to primarily be looking primarily for non-OS >> software modifying OS inhabited memory blocks. Wonder how they're definining >> (and maintaining the definit

RE: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread Michael S Hines
Doesn't a hardware 'feature' such as this lock software into a two-state model (user/priv)? Who's to say that model is the best? Will that be the model of the future? Wouldn't a two-state software model that works be more effective? It's easier to change (patch) software than to rewire hardw

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread ljknews
At 10:54 AM -0500 12/13/05, Kenneth R. van Wyk wrote: > FYI, eWeek has an interesting article on Intel's "System Integrity Services," > which aims to add hardware level protection against rootkits. Now, it seems > to me that they're bundling all sorts of nasty critters in with their > definitio

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, "Kenneth R. van Wyk" writes: >FYI, eWeek has an interesting article on Intel's "System Integrity Services," >which aims to add hardware level protection against rootkits. Now, it seems >to me that they're bundling all sorts of nasty critters in with their >defini

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread Ron Forrester
On 12/13/05, Kenneth R. van Wyk <[EMAIL PROTECTED]> wrote: > The detection mechanism seems to primarily be looking primarily for non-OS > software modifying OS inhabited memory blocks. Wonder how they're definining > (and maintaining the definition) of each... I also wonder how it'll impact > nea