Attacking Intel TXT - Paper
Attacking Intel TXT - Paper
Attacking Intel TXT - Paper
Rafal Wojtczuk
rafal@invisiblethingslab.com
Joanna Rutkowska
joanna@invisiblethingslab.com
Abstract
In this paper we present the results of our research into security of the Intel Trusted
Execution Technology, part of the vProTM brand. We describe a practical attack that is
capable of bypassing the TXT's trusted boot process, a key building block for Intel's vision of
Trusted Computing. As part of the attack we also discuss practical attacks on SMM memory
in modern Intel systems.
keywords: Trusted Computing, Trusted Execution Technology, System Management Mode,
TXT, SMM, STM, BIOS, security, analysis, attacks.
1.
Introduction
1TXT requires support from both the CPU and the chipset
2.
1.
2.
3.
SMM Attacks
2 By a system-level malware we mean malware which is resident because of replacing/infecting crucial,privileged, nonvolatile code (e.g. a kernel binary, dll/sys
binary, or boot sector, or bios image)
4.
[2]
5.
Summary
References
[1]
http://invisiblethingslab.com