Skip to main content

#HITB2014KUL White Paper: Using Intel TXT to Attack BIOSes

posted onJanuary 30, 2015
by l33tdawg

Authors: Xeno Kovah, Corey Kallenberg, John Butterworth amd Sam Cornwell - The MITRE Corporation

Presentation Overview: http://conference.hitb.org/hitbsecconf2014kul/sessions/senter-sandman-using-intel-txt-to-attack-bioses/

Abstract

A comparatively large number of security problems at the PC BIOS level have been found in the last 2 years relative to the preceding years [7].

In this paper we will discuss the interplay between the behavior of Intel Trusted Execution Technology (TXT) and existing at- tacks, and how this leads to Intel TXT being useful for an attacker. We will also discuss how Intel TXT behavior has changed in “newer CPUs” (not defined by the Intel documentation), and how that removes the possibility of these initial attacks, while simultaneously removing the trustworthiness of technologies like Copernicus 2[8] for combatting attacks like the “Smite’em” SMM MitM[9]. This leads to a situation where if TXT behaves in the old way, a system is vulnerable to certain attacks, and if it behaves in the new way, it’s vulnerable to others.

DOWNLOAD WHITE PAPER (PDF)

Source

Tags

Intel BIOS HITB2014KUL

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th