What I don't understand is how is this enforcement guaranteed at kernel-level? If kernel integrity is compromised, then pinning those bits isn't really gonna do much. It may prevent exploit scenarios where you have limited control but if you have something like arb R/W...
-
-
-
Yep, that's my point :) It raises the bar && difficulty of some exploits (depends on your primitives, of course), but if you compromise ring0, it's game over. In a hypervisor-enforcement case, we ASSUME compromise ring0, and bypassing this requires additional vulnerability :)
Kraj razgovora
Novi razgovor -
-
-
I'm not sure that VMMs are the best solution for this type of problem... but much faster to deploy in the eco system than silicon modifications
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.