However, it will trace the outlines of the computer security problem and show how the security kernel
approach meets the requirements for a workable solution--although recent termination has nipped in the bud very promising work toward a solution.
To better understand kernel mode rootkits let's take a look at the basic principles of the security kernel
architecture used in Windows NT/2000/XP platform design.
In the security community, efforts focused on properties of multilevel security kernels
and supposedly small trusted computing bases have had some success in formalizing requirements and encouraging improved system architectures.