Posted Jun 2, 2005 20:57 UTC (Thu) by zakaelri
In reply to: Weak
Parent article: The Integrity Measurement Architecture
The trusted computing folk can get around this by prohibiting gdb
Presumably, the trusted computing folks would not have gdb installed on a secure machine--gdb is inheirently insecurable from their perspective. The entire suite of dev tools is usually the first thing removed from a secure system.
Also, you could use strip to remove the symbols from your binaries. That would make it nigh impossible to find anything with gdb.
to post comments)