Jump to content
Nytro

Attacking Intel TXT via SINIT code execution hijacking

Recommended Posts

Attacking Intel TXT via SINIT code execution hijacking

Rafal Wojtczuk

rafal@invisiblethingslab.com

Joanna Rutkowska

joanna@invisiblethingslab.com

November 2011

Abstract

We present a software attack against Intel® TXT that exploits an implementation problem within a so

called SINIT module. The attack allows to fully bypass Intel TXT, Intel Launch Control Policy (LCP),

and additionally also provides yet-another-way to compromise SMM code on the platform.

Download:

http://www.invisiblethingslab.com/resources/2011/Attacking_Intel_TXT_via_SINIT_hijacking.pdf

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...