Главная
Study mode:
on
1
Intro
2
Inside Intel CPU
3
Firmware Interface Table (FIT)
4
Microcode Update binary main header
5
Microcode Update binary extended header
6
Microcode Update binary data
7
Known facts about Microcode
8
Authenticated Code Modules (ACMS)
9
Useful links to start digging
10
Updating Microcode in UEFI BIOS
11
Microcode Update loading process
12
Platform Init
13
Microcode Downgrade
14
Side channel attacks
15
Debug capabilities
16
Downgrading ACMs. Intel BIOS Guard
17
Downgrading ACMs. Intel TXT
18
#Report and Reaction
19
#Mitigations
Description:
Explore the intricacies of bypassing hardware-based trusted boot through x86 downgrade in this 33-minute conference talk from the Hack In The Box Security Conference. Delve into the vulnerability discovered in the Intel CPU microcode loader, which allows for downgrading CPU microcode and potentially removing security fixes for vulnerabilities like Spectre var2. Examine the implications of loading older versions of Intel Authenticated Code Modules (ACMs) and their impact on Intel security technologies such as Boot Guard, BIOS Guard, TXT, and SGX. Learn how exploiting patched vulnerabilities in ACMs can lead to bypassing trusted/measured boot on Intel TXT & BIOS Guard protected platforms. Gain insights into firmware security, undocumented technologies, and architectural flaws as the speaker demonstrates the practical application of this attack vector on a real-world system.

Bypassing Hardware-Based Trusted Boot Through x86 Downgrade

Hack In The Box Security Conference
Add to list
0:00 / 0:00