evn
January 12th, 2004, 03:21
From the Article:
Quote:
A number of damaging worms from last year relied on buffer overflows. Around 50 percent of the Windows security updates from Microsoft in the last two years may have been rendered unnecessary if the technology existed then, according to an analysis by AMD and Microsoft.
|
I don't know about anyone else, but i find it irresponsible for a software company (or programmer) to write code that relies on the underlying systems security to function as securely as possible. Just because the CPU can prevent attack doesn't mean that everybody is using that CPU, or an operating system that takes advantage of it.
I don't think that technology like this will (or can) be used as a reverse-engineering hindrance at the moment, due to the nature of the technology and the current state of difference between computer systems worldwide. To use the technology would require the company to target a specific hardware and software configuration, which commercial companies often cannot (or won't) support due to complications with other hardware or software (very important in fields of animation and media, CGI, etc.).
The article doesn't really tell much about the hardware except that it read-only's the buffer memory. If the hardware was changed to read-only the entire application, packers and self-modifying code would become unusable and would (probably) leave the software less protected than it originally was.
CPU emulation software (such as VMWare) could always be used to bypass it on systems that support the technology, which i'm sure would be done.