Mr.Bojangles wrote:There is already a know method for non-TPM systems that is basically deflate->keygen->decrypt->change->compress->write-range->write. Since TPM isn't secure the cert method which is only different by the crypto used, is most likely fail too. Like most tech that is mostly the result of greed for market shares, it's not high frequency enough for real malware authors to care about..
Please tell us your way or provide a solution how to make bootkits work impossible.
Rules: you can't use crutches like HIPS, you have to do this conceptually, your solution should be hardware-assisted, not impact on overall system performance and boot time.
If the computer runs an idiot - there is nothing can help.