The Integrity Measurement Architecture
Posted May 26, 2005 14:01 UTC (Thu) by wdupre1
Parent article: The Integrity Measurement Architecture
Okay, so I can verify that my executable code is blessed. How does this protect me from exploits that use "blessed" interpreters, e.g. Perl, Python, Java, Ruby, Bash, etc.
In the windows world, many viruses, trojans, and worms are written in embedded scripting languages. How does this protect me in the M$ scenarios?
Does each interpreted program also need a hash signature?
This seems to be a limited solution.
to post comments)