Secure Coding mailing list archives

Intel turning to hardware for rootkit detection


From: gem at cigital.com (Gary McGraw)
Date: Wed, 14 Dec 2005 12:38:49 -0500

Ah yes.  Type safety to all, and to all a good night.

gem

 -----Original Message-----
From:   ljknews [mailto:ljknews at mac.com]
Sent:   Wed Dec 14 11:36:20 2005
To:     Secure Coding Mailing List
Subject:        RE: [SC-L] Intel turning to hardware for rootkit detection

At 9:14 AM -0500 12/14/05, Gary McGraw wrote:
No, that's a copy of stackguard.  The real problem with all of these
approaches is that they don't fix the root problem.  Finding and removing
buffer overflow conditions with a static analysis tool is far superior.

But still better is using a programming language that does not allow
buffer overflows.
-- 
Larry Kilgallen
_______________________________________________
Secure Coding mailing list (SC-L)
SC-L at securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php




----------------------------------------------------------------------------
This electronic message transmission contains information that may be
confidential or privileged.  The information contained herein is intended
solely for the recipient and use by any other party is not authorized.  If
you are not the intended recipient (or otherwise authorized to receive this
message by the intended recipient), any disclosure, copying, distribution or
use of the contents of the information is prohibited.  If you have received
this electronic message transmission in error, please contact the sender by
reply email and delete all copies of this message.  Cigital, Inc. accepts no
responsibility for any loss or damage resulting directly or indirectly from
the use of this email or its contents.
Thank You.
----------------------------------------------------------------------------




Current thread: