|
BugTraq
Firewire Attack on Windows Vista Mar 05 2008 03:53PM Bernhard Mueller (research sec-consult com) (2 replies) RE: Firewire Attack on Windows Vista Mar 05 2008 09:30PM Roger A. Grimes (roger banneretcs com) (4 replies) RE: Firewire Attack on Windows Vista Mar 06 2008 10:01AM bzhbfzj3001 sneakemail com (1 replies) Re: Firewire Attack on Windows Vista Mar 07 2008 07:51AM Tonnerre Lombard (tonnerre lombard sygroup ch) (1 replies) Re: Firewire Attack on Windows Vista Mar 06 2008 07:54AM Tonnerre Lombard (tonnerre lombard sygroup ch) |
|
Privacy Statement |
> As somewhat indicated in the paper itself, these types of physical DMA attacks are possible against any PC-based OS, not just Windows. If that's true, why is the paper titled around Windows Vista?
>
> I guess it makes headlines faster. But isn't as important, if not more important, to say all PC-based systems have the same underlying problem? That it's a broader problem needing a broader solution, instead of picking on one OS vendor to get headlines?
Roger, you should note that Adam's "Hit by a Bus" paper includes information
about how Linux users can load their OS' Firewire driver in a way that should
disallow physical memory DMA access, and close this attack vector. I have not
yet seen anyone explain how to do the same in Windows. If there is no such
option in Windows (as the Panholzer paper claims), then Microsoft deserves
the negative attention.
> [Disclaimer: I'm a full-time Microsoft employee.]
As for "broader solutions", Microsoft is in an excellent position to help
improve the situation -- maybe you could shed some light on their efforts?
-Peter
[ reply ]