[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Undetectable Rootkits using Virtualization



Political technology is presently making the following a naïve assumption:

> But if one can physically remove the disk drive and investigate it on a
proper forensic test bed, ...

Because the "trusted computing" initiatives spurred by corporate media thugs
are forcing hardware vendors to embed cryptologically-secure "agents" into
our PCs, below the BIOS, and into the hard drives themselves.

Read more at "http://arstechnica.com/news.ars/post/20060214-6178.html"; or
Google for "trusted hard drive" yourself.  Consider this quote:

"The new hard drives will allow the creation of "trusted storage units,"
areas of the drive where only approved applications will be able to read and
write data." 

So what is an "approved" application?  First of all, it's not the owner.
Under this euphemistic "trusted computing" cover, your PC (or your voting
system) can establish a cryptologically snoop-proof channel between the CPU
and hard drive, and will be able to execute programs totally out of your
view or control (beyond pulling the plug).  The "trusted computing module"
can spy on your habits, can disable your programs or corrupt your data, and
can "phone home" with encrypted reports whenever there's an internet
connection available.  All beyond the reach of anti-malware or "forensic"
tools.

So when you assert, "here no way malware can go undetected," I would say all
you will be able to say is, "there's something there," but the vendors will
insist, "it's good for you, it's anti-virus, TRUST US!"

Who will hold the keys?

--
Pete Klammer, P.E. / ACM(1970), IEEE, ICCP(CCP), NSPE(PE), NACSE(NSNE)
3200 Routt Street / Wheat Ridge, Colorado 80033-5452
(303)233-9485 / Fax:(303)274-6182 / Mailto:PKlammer@xxxxxxx
 "Idealism doesn't win every contest; but that's not what I choose it for."


-----Original Message-----
From: Paul E Condon [mailto:pecondon@xxxxxxxxxxxxxxxx] 
Sent: Friday, June 30, 2006 10:07 AM
To: cvv-discuss@xxxxxxxxxxxxxxxxx
Subject: Re: Undetectable Rootkits using Virtualization

Root kit can be very hard to detect if one assumes that one must also
keep the computer running while doing the investigation, or that there
are limits imposed by owner privacy, or software vendor proprietary
rights. But if one can physically remove the disk drive and
investigate it on a proper forensic test bed, and if the design
documentation of the manufacturer of the disk drive is available,
there no way malware can go undetected.

I think that there is a real problem with software security on
computers that are used in elections, but these problems would largely
be resolved if the official record were the paper ballot as marked by
the voter, and the computer use were confined to processing steps that
could easily be repeated on different computers using different
operating systems, and if this repeating were frequently done as a
matter of course, not something confined to a court ordered recount.

But most of all, we should really 'sweat the details' of how the use
of computers should be regulated and the regulations enforced. I see
little room for proprietary, secret software in a realistic system.


On Thu, Jun 29, 2006 at 11:19:09PM -0600, Joe Pezzillo wrote:
> 
> If you thought the security problems in existing systems were bad,  
> check this out:
> 
> http://theinvisiblethings.blogspot.com/2006/06/introducing-blue- 
> pill.html
> 
> 
> "Now, imagine a malware (e.g. a network backdoor, keylogger, etc...)  
> whose capabilities to remain undetectable do not rely on obscurity of  
> the concept. Malware, which could not be detected even though its  
> algorithm (concept) is publicly known. Let's go further and imagine  
> that even its code could be made public, but still there would be no  
> way for detecting that this creature is running on our machines...
> 
> Over the past few months I have been working on a technology code- 
> named Blue Pill, which is just about that - creating 100%  
> undetectable malware, which is not based on an obscure concept."
> 
> 
> [Note: this is not a script kiddie writing this, it's a world-class  
> security researcher who will be presenting her work at the Black Hat  
> conference at the end of July, comments on the blog indicate that a  
> similar exploit for Intel's virtualization technology is also going  
> to be presented]
> 
> 

-- 
Paul E Condon           
pecondon@xxxxxxxxxxxxxxxx