Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Intel Security Technology Hardware

Intel Patches Flaws In Trusted Execution Tech 84

An anonymous reader writes "Joanna Rutkowska's company Invisible Things Lab has issued the results of their research into flaws in Intel's Trusted Execution Technology (TXT), whose function is to provide a mechanism for safe loading of system software and to protect sensitive files. ITL describes how flaws in TXT can be used to compromise the integrity of a software loaded via an Intel TXT-based loader in a generic way, fully circumventing any protection TXT is supposed to provide. The attack exploits an implementation error in the so-called SINIT Authenticated Code modules and that could potentially allow a malicious attacker to elevate their privileges. Intel has released a patch for the affected chipsets, which include the Q35, GM45, PM45 Express, Q45, and Q43 Express." Here are ITL's press release (PDF) and Intel's advisory.
This discussion has been archived. No new comments can be posted.

Intel Patches Flaws In Trusted Execution Tech

Comments Filter:
  • by pclminion ( 145572 ) on Wednesday December 23, 2009 @12:23AM (#30532556)

    It was true fifty years ago, and it's still true today: If I have access to the hardware, you're screwed.

    Hardware safety is like thread safety. It originates at the lowest levels and percolates upward. In thread safety, the lowest levels are primitives like interlocked exchange. On top of this, we build spin-locks. On top of those we build critical sections. Etc. Hardware can be made secure by making it tamper-resistant. Cryptographic ICs can be rigged to self-destruct when somebody opens the package. Given a secure cryptographic chip, hardware security can be assembled on top of it. I'm not willing to go out on a limb and say that we have TRULY secure cryptographic chips, but if and when we do, we can built unconditionally secure hardware on top of them just like we build thread safety out of interlocked exchanges.

  • Re:Readme.TXT (Score:1, Interesting)

    by Anonymous Coward on Wednesday December 23, 2009 @01:58AM (#30532932)

    What about not executing what isent set +x.. and save by default new file as -x.
    Oh that right, it already the case except on flawed OS.

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...