TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Mike N.
from: Robert Comer
date: 2006-10-23 09:43:32
subject: Re: Browser Security

From: "Robert Comer" 

>   Conversely, it makes it that much more desireable for the bad guys to
> find a way to break outside the VM, knowing that it gets you into a high
> value target.

That's not going to be easy to do, the isolation is pretty close to
physical hardware level. (At least with the Microsoft products, not sure
about VMWare with it's shared RAM and RAM overcommit schemes.

--
Bob Comer





"Mike N."  wrote in message
news:80dpj25vdm1memg5aqt08opk7ndqmiv7ut{at}4ax.com...
> On Mon, 23 Oct 2006 19:11:04 +1000, John Beckett
>  wrote:
>
>> As soon as VMs become commonly used to avoid
>>malware, the malware authors will look for holes they can poke through to
>>access  the guest system.
>
>   It makes some interesting spy-VS-spy situations.  Currently, there is
> some malware that does VM detection and won't activate, thinking it is
> running in an AV vendor's research lab.
>
>   Conversely, it makes it that much more desireable for the bad guys to
> find a way to break outside the VM, knowing that it gets you into a high
> value target.

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.