Skip to main content

#HITB2014KUL White Paper: Using Intel TXT to Attack BIOSes

posted onJanuary 30, 2015
by l33tdawg

Authors: Xeno Kovah, Corey Kallenberg, John Butterworth amd Sam Cornwell - The MITRE Corporation

Presentation Overview:


A comparatively large number of security problems at the PC BIOS level have been found in the last 2 years relative to the preceding years [7].

In this paper we will discuss the interplay between the behavior of Intel Trusted Execution Technology (TXT) and existing at- tacks, and how this leads to Intel TXT being useful for an attacker. We will also discuss how Intel TXT behavior has changed in “newer CPUs” (not defined by the Intel documentation), and how that removes the possibility of these initial attacks, while simultaneously removing the trustworthiness of technologies like Copernicus 2[8] for combatting attacks like the “Smite’em” SMM MitM[9]. This leads to a situation where if TXT behaves in the old way, a system is vulnerable to certain attacks, and if it behaves in the new way, it’s vulnerable to others.





You May Also Like

Recent News

Tuesday, March 20th

Monday, March 19th

Friday, March 16th

Thursday, March 15th

Wednesday, March 14th

Tuesday, March 13th