Jump to content
Nytro

Attacking Intel TXT via SINIT code execution hijacking

Recommended Posts

Posted

Attacking Intel TXT via SINIT code execution hijacking

Rafal Wojtczuk

rafal@invisiblethingslab.com

Joanna Rutkowska

joanna@invisiblethingslab.com

November 2011

Abstract

We present a software attack against Intel® TXT that exploits an implementation problem within a so

called SINIT module. The attack allows to fully bypass Intel TXT, Intel Launch Control Policy (LCP),

and additionally also provides yet-another-way to compromise SMM code on the platform.

Download:

http://www.invisiblethingslab.com/resources/2011/Attacking_Intel_TXT_via_SINIT_hijacking.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...