[11580] in cryptography@c2.net mail archive
Re: Palladium and malware
daemon@ATHENA.MIT.EDU (Ben Laurie)
Thu Aug 29 10:43:05 2002
Date: Thu, 29 Aug 2002 14:08:40 +0100
From: Ben Laurie <ben@algroup.co.uk>
To: Paul Crowley <paul@ciphergoth.org>
Cc: cryptography@wasabisystems.com
Paul Crowley wrote:
> I'm informed that malware authors often go to some lengths to prevent
> their software from being disassembled. Could they use Palladium for
> this end? Are there any ways in which the facilities that Palladium
> and TCPA provide could be useful to a malware author who wants to
> frustrate legitimate attempts to understand and defeat their software?
That would depend on what facilities the OS layers on top of
TCPA/Palladium. Certainly I could believe an OS would exist that would
simply refuse read access to executables, and Palladium/TCPA could be
used to encrypt them such that they were inaccessible except under that OS.
So, in short. Yes.
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
Available for contract work.
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com