Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Dont Hold Out Hopes For Anti-Rootkit Chips

    Written by

    Larry Seltzer
    Published December 16, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      When a term like “rootkit” gets enough buzz that the local Sunday paper mentions it you just have to expect vendors to blurt out that they have a solution for it, whether they do or not.

      I think this is what happened with Intels recent announcement that they are working on anti-rootkit hardware, a magical rootkit-busting chip.

      The technology they describe is certainly interesting and useful, but its not about fighting rootkits.

      Intel has two papers I found on their site about the technology, Runtime Integrity and Presence Verification for Software Agents and OS Independent Run-time System Integrity Services. The latter paper is longer and more detailed.

      SIS (System Integrity Services), as the name implies, is about protecting the integrity of the system. Thus the purpose of the hardware is to monitor specific code and data areas in the system for activities deemed to be suspicious.

      While there are some references in the longer paper to rootkits, its clear that the technique was designed not so much to protect operating systems as security programs.

      Its common for malware to attempt to terminate or otherwise interfere with security programs, and Intels SIS would detect this. SIS would also detect buffer overflows in monitored programs attempting to cause arbitrary code execution.

      SIS uses the Intel IA-32 System Management Mode (SMM) that was designed for the SL processors almost 15 years ago for reasons, if I remember correctly, to do with power management.

      /zimages/2/28571.gifAnti-spyware battles rootkits with rootkit tactics. Click here to read more.

      In a sense it acts something like a hardware ICE (In-Circuit Emulator), the gold standard in hardware debugging, to gain absolute control over the use of hardware in the PC.

      In this way it can block many software attacks in a clean and tamper-proof way. And because of SMM, it can also monitor for certain hardware-based attacks, such as a malicious device that attempted to inject attack code in the system through DMA (Direct Memory Access), which bypasses the CPU and would therefore bypass any software-based protections.

      Next page: Rootkits versus SIS: And the winner Is…

      Rootkits vs


      . SIS: And the Winner Is…”>

      So would it work? It would and it wouldnt. Clearly SIS can monitor and flag what it claims it can, but I am more concerned with false positives and the credibility of the system.

      A system like SIS cannot work as hardware alone; the protections it needs to employ require a deep understanding of the operating system and certain external, trusted programs one would choose to protect.

      The SIS monitoring needs to be activated on those areas of memory, and the areas will differ with different operating systems (the SIS papers make clear that the technique is not platform-specific and should work as well with Linux as with Windows).

      Even different versions of Windows, perhaps even different patch levels, will require updates to the use of SIS. In fact, use of SIS probably needs to be embedded in the OS itself.

      And yet, sometimes the techniques used by rootkits, or something close enough to those techniques that SIS couldnt tell the difference, are employed by legitimate add-on programs, for example, unsurprisingly, security programs themselves.

      Such programs, and not to mention Windows, update themselves periodically.

      So how is the SIS system to know what is a legitimate, trustworthy operating system or 3rd party component, and what is an attacker? Perhaps when requesting protection through SIS a challenge could be issued to the user, and here we enter the familiar realm of social engineering:

      User pops in new music CD from our pals at Sony BMG; Software Autoplays and installs; since its smart, modern software, it registers itself with the SIS system; User is asked “do you actually trust this thing and want to let it install? User does want to let the program install, and so says yes.

      /zimages/2/28571.gifWhere are rootkits coming from? Click here to read more.

      Its a cynical example, but I think it raises the realistic point that Intels proposal, at least with respect to rootkits, doesnt get you around the issue of trust.

      Certain programs have to be trusted generally in the system. Most users want to be able to install new programs (were talking consumers here, not businesses where IT should control what gets installed), and most users are not qualified to judge what is a trustworthy program. So what have we accomplished?

      Ill go one step further and say, once again with respect to rootkits, that this sort of protection doesnt eliminate the need to do other checking of the sort performed by tools from F-Secure and Sysinternals.

      People argue over what the best way is to detect rootkits. Right now I suspect it is tools like the ones I just mentioned.

      Of course, a rootkit might try to interfere with tools like these too, so perhaps SIS could be helpful in protecting them, and that would be valuable. But dont count on SIS to stop a rootkits in and of itself.

      Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983.

      /zimages/2/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      More from Larry Seltzer

      /zimages/2/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Larry Seltzer
      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×