Palladium and malware

Nomen Nescio nobody at dizum.com
Sat Aug 31 00:00:27 EDT 2002


Bill Frantz writes, regarding the possibility that the Palladium
architecture could be designed to resist the use of encrypted 
code:

> All general purpose computers require a way to move data space to code
> space to support compilation.

Well, this is usually done by storing the data to the disk, and
then later loading it as a program file.  It does not prevent data
and code memory from being distinct, which was the proposal for how
Palladium could reduce the risk of being used to run encrypted code.
If a Palladium program was forced to go through the disk, that is, to
load data, decrypt it, store it to the disk, and then load it as code,
then that would provide a means to get access to the unencrypted code,
defeating the goal of keeping the code within the "vault".

> Even if you don't allow compilation, most
> modern systems have enough different powerful scripting languages that
> interpretation is sufficient to support viruses.

It's not clear why these languages would use the Palladium features and
run their scripts in the shielded mode.  But you're right that if they
did, this could provide a mechanism for disassembly-resistant code.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list