[11580] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Palladium and malware

daemon@ATHENA.MIT.EDU (Ben Laurie)
Thu Aug 29 10:43:05 2002

Date: Thu, 29 Aug 2002 14:08:40 +0100
From: Ben Laurie <ben@algroup.co.uk>
To: Paul Crowley <paul@ciphergoth.org>
Cc: cryptography@wasabisystems.com

Paul Crowley wrote:
> I'm informed that malware authors often go to some lengths to prevent
> their software from being disassembled.  Could they use Palladium for
> this end?  Are there any ways in which the facilities that Palladium
> and TCPA provide could be useful to a malware author who wants to
> frustrate legitimate attempts to understand and defeat their software?

That would depend on what facilities the OS layers on top of 
TCPA/Palladium. Certainly I could believe an OS would exist that would 
simply refuse read access to executables, and Palladium/TCPA could be 
used to encrypt them such that they were inaccessible except under that OS.

So, in short. Yes.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

Available for contract work.

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post