Frequent Voting Rights Forum Participant
Post Number: 151
Best of Black Box?
Votes: 1 (A keeper?)
|Posted on Friday, June 30, 2006 - 12:53 pm: ||
Microsoft Research has demonstrated a rootkit that inserts a virtual machine monitor between an operating system (e.g., Windows) and the CPU on which it runs. The rootkit then uses this privileged position to force the OS to do whatever the rootkit's creator wants.
This is closely analogous to the malware loader I and others described in _A Deeper Look: Rebutting Shamos on e-Voting_ at s.3.1.2 (http://www-db.stanford.edu/pub/keller/2006/Shamos-rebuttal.pdf). In a voting machine, the machine's firmware could play the role of the rootkit, and the voting application the role of the OS under attack.
(Message edited by ron_crane on June 30, 2006)