Matthew Garrett ([personal profile] mjg59) wrote 2012-05-31 06:39 am (UTC)

Say you want to attack a machine that has Windows installed. One choice is to compromise part of the Windows trust chain. If that's been implemented competently then that's difficult. Alternatively, take a signed copy of Linux that allows arbitrary ring 0 code execution, boot that, modify the firmware entry points so that they call out to your code and then chain into the Windows bootloader. The kernel boots fast enough that you've only added a second or two to the Windows boot time, but you've compromised what was supposed to be a trusted system.

Post a comment in response:

If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org