A computer system includes a peripheral device and a processing unit. The
processing unit is adapted to execute a driver for interfacing with the
peripheral device in a standard mode of operation and an authentication
agent in a privileged mode of operation, wherein the authentication agent
includes program instructions adapted to authenticate the driver. The
peripheral device may comprise a communications device, such as a
software modem. A method for identifying security violations in a
computer system includes executing a driver in a standard processing mode
of a processing unit; transitioning the processing unit into a privileged
processing mode; and authenticating the driver in the privileged
processing mode. The driver may be adapted for interfacing with a
communications peripheral device, such as a software modem.