Secure Coding mailing list archives

Intel turning to hardware for rootkit detection


From: mshines at purdue.edu (Michael S Hines)
Date: Tue, 13 Dec 2005 15:19:12 -0500

Doesn't a hardware 'feature' such as this lock software into a two-state model
(user/priv)?

Who's to say that model is the best?  Will that be the model of the future? 

Wouldn't a two-state software model that works be more effective?  

It's easier to change (patch) software than to rewire hardware (figuratively speaking).

Just wondering...

Mike Hines
-----------------------------------
Michael S Hines
mshines at purdue.edu 




Current thread: