Breaking Hardware-Enforced Security With Hypervisors

by Joseph Sharkey
Sept. 15, 2017 1 comment www.blackhat.com belen_caty Pen Testing & Audits

This presentation will highlight the age-old problem of misconfiguration of Intel TXT by exploiting a machine through the use of another Intel technology, the Type-1 hypervisor (VT-x). Problems with these technologies have surfaced not as design issues but during implementation. Whether there remains a hardware weakness where attestation keys can be compromised, or a software and hardware combination, such as exposed DMA that permits exfiltration, and sometimes modification, of user process memory. This presentation will highlight one of these implementation flaws as exhibited by the open source tBoot project and the underlying Intel TXT technology. Summation will offer defenses against all too often pitfalls when deploying these systems, including proper deployment design using sealed storage, remote attestation, and hardware hardening.

https://www.blackhat.com/us-16/briefings.html#breaking-hardware-enforced-security-with-hypervisors

Avatar
Steven Ulm 2 months, 4 weeks ago

Intel technology is getting better with each day, but still there are visible flaws...

Reply