“…Compromise of protected code via rootkits [22] represents one of the most prevalent exploits. Recent work has begun exploring different hardware based approaches to security [5,6,12] with many people coming to believe that we cannot solely use software to protect software and only hardware, coupled with software, can do that job successfully [1,2,3,4,5,6,7,8,9,10,11,12,13]. Though a number of advantages to hardware over software have been suggested, we found no research discussing what precisely makes hardware a significant improvement over software and just what capabilities hardware provides that software cannot.…”