From sci-fi movies we know that human emotions are
a great power that can overcome any computer
When annoyed enough, administrators (humans) become very dangerous.
They may reboot the machine to a recovery OS and wipe out the offending
piece of software.
Or even do this online, with using something like Intelâs AMT.
â pa
On 13-Sep-2012 07:49, Tracy Camp wrote:
From a driver, you can deny the administratorâs ability to modify the
ACL and you can also deny the administrators effort to load other
drivers. Administrators are not by default on the other side of a
security boundary from the kernel in the windows security model, but
they certainly can be placed there. Administrators are not by default
granted unchecked abilities to load drivers on modern windows releases
either (driver signing etc.). What makes the kernel the kernel is that
it is code executing in ring0. Its absurd to argue that it canât be
done and in most respects the modern windows kernel assists and
facilitates the creation of such security boundaries. Kernel and user
run at different privilege levels and ring0 is more privileged than
ring3 regardless of what you are in the systems security model. So yes,
security software and malware can be similar in implementation, they
just differ in intent and the level of user opt-in.t.
On Wed, Sep 12, 2012 at 5:08 PM, > mailto:xxxxx> wrote:
>
> âBS. From a driver, you can control what other drivers are loaded
> (see also
> win8 ELAM) and you should then be able to protect arbitrary
> resources from
> even admin users. Yes this is creating a sort of after the fact
> security
> barrier between kernel and user-mode admin, but its the security barrier
> that the hardware is setup to enforce, so no reason it canât be done.â
>
> An administrator can take ownership of any securable object. An
> administrator can disable drivers, including your security driver.
> An administrator can load other drivers that can compromise kernel
> and disable your security driver.
>
> You can only protect against an account that absolutely is not
> allowed to cross the security boundary. An administrator is not such
> an account.
>
></mailto:xxxxx>