RE: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread Chris Wysopal
On Wed, 14 Dec 2005, ljknews wrote: > At 9:14 AM -0500 12/14/05, Gary McGraw wrote: > > No, that's a copy of stackguard. The real problem with all of these > > approaches is that they don't fix the root problem. Finding and removing > > buffer overflow conditions with a static analysis tool is

RE: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread Gary McGraw
Ah yes. Type safety to all, and to all a good night. gem -Original Message- From: ljknews [mailto:[EMAIL PROTECTED] Sent: Wed Dec 14 11:36:20 2005 To: Secure Coding Mailing List Subject:RE: [SC-L] Intel turning to hardware for rootkit detection At 9:14 AM -0500 12/14

RE: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread ljknews
At 9:14 AM -0500 12/14/05, Gary McGraw wrote: > No, that's a copy of stackguard. The real problem with all of these > approaches is that they don't fix the root problem. Finding and removing > buffer overflow conditions with a static analysis tool is far superior. But still better is using a pro

RE: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread Gary McGraw
lto:[EMAIL PROTECTED] Sent: Wed Dec 14 09:03:55 2005 To: 'Secure Coding Mailing List' Subject: RE: [SC-L] Intel turning to hardware for rootkit detection Isn't Smashguard the same technology (in software) added to the latest Microsoft .NET compiler and run time? While protect

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread ljknews
At 1:33 AM -0800 12/14/05, Crispin Cowan wrote: > Smashguard, if I recall correctly, offers approximately the protection > of existing compiler methods, but with the added fun of requiring > modified (non-existent) hardware. > > The referenced hardware in the IEEE article and the intel.com pages >

RE: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread Michael S Hines
the Admin side. ---Michael S Hines[EMAIL PROTECTED]   From: mudge [mailto:[EMAIL PROTECTED] Sent: Tuesday, December 13, 2005 6:01 PMTo: Hines, Michael S.Cc: 'Secure Coding Mailing List'Subject: Re: [SC-L] Intel turning to hardware for rootkit detection There was a lady

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-14 Thread Crispin Cowan
Smashguard, if I recall correctly, offers approximately the protection of existing compiler methods, but with the added fun of requiring modified (non-existent) hardware. The referenced hardware in the IEEE article and the intel.com pages appears to be some descendant of Palladium; it is a hardwar

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread Greenarrow 1
AIL PROTECTED]> To: "Kenneth R. van Wyk" <[EMAIL PROTECTED]> Cc: "Secure Coding Mailing List" Sent: Tuesday, December 13, 2005 9:28 AM Subject: Re: [SC-L] Intel turning to hardware for rootkit detection > On 12/13/05, Kenneth R. van Wyk <[EMAIL PROTECTED]>

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread Gadi Evron
http://www.eweek.com/article2/0,1895,1900533,00.asp Gee this sounds just like virus wars, using add-on products to make up for weakness in the operating system. A reliable operating system would not permit such modifications in the first place Whatever happened with Intel NX technology? Any

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread mudge
There was a lady who went to Purdue, I believe her name was Carla Brodley. She is a professor at Tufts currently. One of her projects, I'm not sure whether it is ongoing or historic, was surrounding hardware based stack protection. There wasn't any protection against heap / pointer overflows and I

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread David Eisner
Ron Forrester wrote: On 12/13/05, Kenneth R. van Wyk <[EMAIL PROTECTED]> wrote: The detection mechanism seems to primarily be looking primarily for non-OS software modifying OS inhabited memory blocks. Wonder how they're definining (and maintaining the definition) of each... I also wonder h

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread ljknews
At 9:28 AM -0800 12/13/05, Ron Forrester wrote: > On 12/13/05, Kenneth R. van Wyk <[EMAIL PROTECTED]> wrote: >> The detection mechanism seems to primarily be looking primarily for non-OS >> software modifying OS inhabited memory blocks. Wonder how they're definining >> (and maintaining the definit

RE: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread Michael S Hines
Doesn't a hardware 'feature' such as this lock software into a two-state model (user/priv)? Who's to say that model is the best? Will that be the model of the future? Wouldn't a two-state software model that works be more effective? It's easier to change (patch) software than to rewire hardw

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread ljknews
At 10:54 AM -0500 12/13/05, Kenneth R. van Wyk wrote: > FYI, eWeek has an interesting article on Intel's "System Integrity Services," > which aims to add hardware level protection against rootkits. Now, it seems > to me that they're bundling all sorts of nasty critters in with their > definitio

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, "Kenneth R. van Wyk" writes: >FYI, eWeek has an interesting article on Intel's "System Integrity Services," >which aims to add hardware level protection against rootkits. Now, it seems >to me that they're bundling all sorts of nasty critters in with their >defini

Re: [SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread Ron Forrester
On 12/13/05, Kenneth R. van Wyk <[EMAIL PROTECTED]> wrote: > The detection mechanism seems to primarily be looking primarily for non-OS > software modifying OS inhabited memory blocks. Wonder how they're definining > (and maintaining the definition) of each... I also wonder how it'll impact > nea

[SC-L] Intel turning to hardware for rootkit detection

2005-12-13 Thread Kenneth R. van Wyk
FYI, eWeek has an interesting article on Intel's "System Integrity Services," which aims to add hardware level protection against rootkits. Now, it seems to me that they're bundling all sorts of nasty critters in with their definition of "rootkit" but it's worth reading, IMHO. The detection