Secure Coding mailing list archives
Intel turning to hardware for rootkit detection
From: weld at vulnwatch.org (Chris Wysopal)
Date: Wed, 14 Dec 2005 12:38:40 -0500 (EST)
On Wed, 14 Dec 2005, ljknews wrote:
At 9:14 AM -0500 12/14/05, Gary McGraw wrote:No, that's a copy of stackguard. The real problem with all of these approaches is that they don't fix the root problem. Finding and removing buffer overflow conditions with a static analysis tool is far superior.But still better is using a programming language that does not allow buffer overflows.
This isn't a solution to code that is already deployed which is the problem that stackguard and static analysis address. -Chris
Current thread:
- Intel turning to hardware for rootkit detection, (continued)
- Intel turning to hardware for rootkit detection David Eisner (Dec 13)
- Intel turning to hardware for rootkit detection Greenarrow 1 (Dec 13)
- Intel turning to hardware for rootkit detection Steven M. Bellovin (Dec 13)
- Intel turning to hardware for rootkit detection Michael S Hines (Dec 13)
- Intel turning to hardware for rootkit detection mudge (Dec 13)
- Intel turning to hardware for rootkit detection Crispin Cowan (Dec 14)
- Intel turning to hardware for rootkit detection ljknews (Dec 14)
- Intel turning to hardware for rootkit detection Michael S Hines (Dec 14)
- Intel turning to hardware for rootkit detection Michael S Hines (Dec 13)
- Intel turning to hardware for rootkit detection ljknews (Dec 14)
- Intel turning to hardware for rootkit detection Chris Wysopal (Dec 14)