SENTER Sandman: Using Intel TXT to Attack BIOSes
暂无分享,去创建一个
A comparatively large number of security problems at the PC BIOS level have been found in the last 2 years relative to the preceding years [7]. In this paper we will discuss the interplay between the behavior of Intel Trusted Execution Technology (TXT) and existing attacks, and how this leads to Intel TXT being useful for an attacker. We will also discuss how Intel TXT behavior has changed in “newer CPUs” (not defined by the Intel documentation), and how that removes the possibility of these initial attacks, while simultaneously removing the trustworthiness of technologies like Copernicus 2[8] for combatting attacks like the “Smite’em” SMM MitM[9]. This leads to a situation where if TXT behaves in the old way, a system is vulnerable to certain attacks, and if it behaves in the new way, it’s vulnerable to others.
[1] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[2] Xeno Kovah,et al. New Results for Timing-Based Attestation , 2012, 2012 IEEE Symposium on Security and Privacy.
[3] Xeno Kovah,et al. BIOS chronomancy: fixing the core root of trust for measurement , 2013, CCS.