Hi, I was reading yesterday how stuxnet infected the dll used by the siemens step7 software to intercept the communication with the PLC and I wondered, is it still so difficult to detect a user-level rootkit these days? I mean, wouldn't it be possible to have a table with sensitive files and their hashes and only authorize signed binaries to change it? What is the state of the art of such techniques to detect that a dll or a binary has been modified?
Thanks!
Thanks!