Folks on this list may be interested in a recent whitepaper talking about types of attacks that leverage PC hardware to attack local software. Hardware reflected injection, anyone?
Paper is available at http://www.forristal.com/material/Forristal_Hardware_Involved_Software_Attacks.pdf Thanks, and happy holidays! - Jeff
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
