Bestand wählen
Merken

Inside Intel Management Engine

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
1st true thank
thank without the help us how a pay the last year he presented how to get K tag over USB at the 33 33 today he will tell us how to interrogate the Intel management engine in a similar way ingenious and devious way please join me in welcoming lexeme go yet seated 34 C 3 few as few holidays I'm speaking about the until the but the problem exists and so this is formula conference for the 2nd year in a row less time until it in the boat how can you until steel below the but acknowledge gold into low the interface of disarray and now I'm going to tell call worked it's a safely into management engine sorry in kind of the science is a private implementation on widely known the industry standards for the bug hardware and low levels of from until and the addition of the I will talk about how we can be used uh for more research and how to use it in practice unfortunately McCormick mark and couldn't think you couldn't come and I will introduce our research alone and the ising that use some 108 a will be too quickly uh
out following management and and research team it was just acknowledges includes the following researchers and Michael the into stratified into the market more of parents a mark more of its Michael that was him never was formed we phone-to-phone ability in into management tension and he's a system programmer and reverse engineer at the interest of flow known virus engineer would be to research of the in the file system you're a coward tough on courts for alone version of the mean and you can find it if you still formed by going in the image and full passing in the a file system and all the properties of the banks of so you can see the opera most all related to uh to me and I'll context so you can feel free to communicate this past fall Christian of your interests at about research however just to say
that I would talk about what is going to mean so it's implemented and how we have to read ejected from the quarrel with 1 ability which marketed font of than I disclosing details politicking works and show improving our achievements the following people since this
whole analysis what is in the the phone but the immediate relief
as a topic for the Gulf of amendment engine and is very popular now our 1st it's almost all the undocumented and very powerful have the same time for example it has full access to platforms hardware including CPU complex it has the abilities to intercept the holes that you were doing when you seen for example keep the keyboard here if she has access to keyboard to use the and of course say bosses uh and to read also a route of trust for winning until security feature like to be on the light uh derailment team Int'l has chosen the following for
EMI means 11 there some independent of the microcontroller and all operation system based on the on the next and building general you get standard will before main CPU you from where there's parts in speech and don't in memory and in a space which mining tool technologists I implemented the scope of the amendment engine I For example active management acknowledges or a DDT in that receives that I PGx still in the I and as a question
of how many people in this whole can what is it Gold but
some in overview of detect of of injected it's so slow stands for giant destruction group and you can find its description in i 2 point you stand out so will reach of the details available in the standard to self and as a result so as a paper of wearable on our block where we design discuss the where the design is described in close details the all too often when such extends standard detected where it into their own functions and g checking until process is described to reciprocal really and some information and writing the founding documents of present in the patent you can see all of the paper once a slight and in the sky
until introduced in direct-connect interface technology into you can finds the resident of the the description of eating into the and in old works I as a diagram showed told types of connections using a specific device was a so-called until this treaty calls which is a departure all commonly used to you is this free but cable and I like to that as target system in this case doesn't require genius of of where agents I was in so that the drawbar causes causes technology is that it works out of box and those who the technological users of social provides Texas to would be fixed future like Jeter and from control through use these reports on In this acidic on on on platforms at the top so this reading on use this rulings and but implements a the private protocol and makes it possible to manipulate the target system and its report on it means that means sports or you will have an independent lines between 1 of the in the independent links between and detected the Torah and beseech is this request and the common used this worried about the bill which was in or did you do eyes that means that a special device appear sons of persistent activation and comments are central device through the colonies been to friends as a device itself integrated into see each of character of the transforms the quantity into detect
if you have data for some of the form in the devices the each means you have almost full control the means to increase uh and doesn't allow pro-whites all spinning any technique for the by can you want public platforms and the 2nd to what the software and hardware in need for any debugging the beginning a sense followed
those of 1st Christian yes the font of a special petition cold you talk which allocated turns especially the ones on this very flesh out where the storage in mean a has petitioned the same structure as if it if the year and to another petitioner for me petition includes and 3 or 4 from where the Buddha but capabilities on all those records means types all onlooker correct or orange but there's been attention paid will be important later and that's all what means
of the fix the fix it theories collective John full of the next 2 or operation Dave design for stability and uh the the design for the button and these jails he set off of the technique used for affection detector and different effects finding also integrated on chips and so on and standard Dave the Virginia ways on and to ordinary bond kind jitter called once might of until extent extends each of its DCT being it's a branded silicon due knowledge DVD giants all internal chip-level logic used organize hardware-level debugging of course crisis executed by chips and if fix is connected to internal law my the special think gold embroidered today freaks interface and this this bridge connects the fixed stories external industry interface like you've been there is a special device in until both from control how to the fixed aggregator it function is to control access to do fixed so the and there the
2 types of of orange types it means of its vendors may use and above rejected bargain form I Ch for example at Twitter petition for orange unlock must be signed by random skiing as this stored in if the if the fuses and act
more interesting parades look uh because of this log provides full access to besiege do internal devices the I'm a little unlocks jittered for any quarter and Freud's unlimited Texas dual memory uh you to impede memory into
management engines and users to devices for support hardware debugging diff expand Roberto managements and effects of functionality and this year's or encourages the from device called again and so on the box and strong uses this device it is about to see
is there and register and we know we know only in the boat no 1 beats uh and really cold heat until unlock repressed and so is this register means on it and you'll asked the platform to do over the look of point 0 or
more interesting is the fixed that aggregate to register but tend to the sum of 2 register of personality register specifies type often look more at Orange and and consent used for a lot of the right to personal to register it means that can center register while what it means that those is beat To ll i'll write that in this expression of the sum of 2 register and uh for the
local bookseller working injustice on 1 of them was about our funding funding will talk petition I petition font is a of the box of the is checking the petition of course ensuring and put some ID and I also know what checks time and because the talk has of time the limitation and after that you've qualities of being but pass include the data entry and the input torque repetition gold oak notes you for until looking of unlocked founded in that platform all right it is not a Laredo more unlocked and by set with this user and register the and then it's a doing research in the after that it's in the
form of a check in the is checking around to see isn't register and you should set in each of the to clean a this register and it the switch on consent and personality it means of our the look after that at the wrong is clinging in the keys and of important but of course
if you have a negative and what we've got the same ective India doesn't allegedly fix constant register it means that the if you want to switch Fonduta and you know I don't need to store a built in even if you have understood connection and it
hoped to work on calculate the more 3rd and local result into keys on the current Europe fully
disclosed barking model is this function as you can see festival nobility and when it's other functional Rabinkin about city fireweed gives incorrect size all of that to read instead of local for size of the buffer differs with file function gets the size was all 5 How also be exported as is so now with its you confront the unit of presentation from look at and active using
that will we're also have of the regions you floor Benjamin tangent and the the 2 research and we uh internal of mean the paretic duration
resulting peace and may be doing it the and after the fall of simple steps on the 1st at 2 8 unification what for targets it means for this said Bennett said assessed out in the 1st descriptor then to use insulin abilityto Lord for those of us read through this expansion of the register and after that you the
you'll have and the course and it a you can add to our research and in the into singing but unfortunately uh
and you will have 1 problem
in because of you'll go on don't have software forwarded by thinking but it is a small problem in and excludes spoke about have to apply to all acknowledge that it's presented by doll doll until the fixed some abstraction layer of bycatch it's on their wage slavery and exposes all Borel would the fixed software models and as who found Delphis wage history supports where's platform form and severe architecture designed to what was different about ports and so on in the hardware let me we know as a dollar user quarrel all instruments that until users for testing and debugging and of its hardware and firmware components so it's provided for a Int'l systems to their for example and to uh going to download resulting in the and all is almost like an
instance shop and has to the same structure but I want to talk about a dull has uh into interface consul interfacing to interface and it's of libraries all layers and so the driver of transport and so the effects on target
refinement equation from until in public description correlation all of the fix the excitement internal interfaces and you can see all through to details about our how hold how internal structure of dialogs
the dollar store work detriment is based on the not modulation motion was there are 2 types of Nods physical and logical physical nuances on the presence real hardware components organize from the properties of the unit and to include in the following levels detector you did the ETC bus and another logical knots represents a certain functionality is that can be used to perform the body and stuff and there are many problems of public corruption of doll doesn't include consideration for equal or was that didn't stop us and we found out that the solution the
following section dial on his uh different alone the uh has some integration and act on different instigated during Travis Engen you calls a library it consideration is included in in corrected XML files that don't use this bias sigh for and to the duration functions the DTD of 2 and always fixity assaults a 1st all of y so forth to salt and HTTP is is a key this simple program on but this is a simple problem all the group told the wise configurational although all things you maybe another of points in 2 degree it's uh for example in might reports of CPU and in no hello there is no consideration
of any devices we found that the quarries 1 and T 2 devices and as a consideration of this device can be found indicate extremophiles lived for anybody can write configuration for any I thank you for example
are on the slide you can see an internal structure of of the bill be serious will flow beseech you is you serious of CPU and this is of delighted to 1 of 4 part and so on top of the other connectives Botsis again at the unique the when how you
how to do because in a fibration of fire of fulfill steps from the 1st decrypt extremophiles the 2nd as the following plants tool prestiti examined the and to use the whole environment for me to bargain pharynx that it's good make you computer personal again some of them are
when 1 moment it
now it it is the worst
from all systems to owner and to
integrate the files of was consideration of dull and so do it it's to at some at the yeah is a child fall of each serious off
BCH and a is a bottom fall fall OP service it is in the core it is linked to serve between in the core and so it's a the institution the
lord to of some developing some library on library and we set up for the the person breaks the need for all to stop or a separate in in the
yeah
yeah yeah can in the GDT table and so the current instruction and to register will you build a team player the at the
and we're doing our sits there is that there is many and
but the end state and instruction in turn into a mean the choice of segments it and new GDT OK an then 1 demo from and it is Boston's it is host platform the neutrophil tips for to the need of for any current or sorry it is not to me the a of how you can see in in the Dean fish interface future interface 1 it is special device between which manufacture for yeah for links between the posts at the EU and be mean and now we're it's some of the donor register for CPU the from kitchen parent said it's the radio was this register the from the and merging thank
remind them on the right is more interesting that might English story and I have uh no you interact I be good the the 1 moment through it's my
machine one's work
and that want answers not good story made that maybe later OK path and poetry
months and detect duration of we we do at detecting go where to mind in respect to reliability in addition on we uh actuate detect for Indian and also we dumped as any sort of and the phones weighted to extract put from scheme they used by of the 1st footage file system it means that you can and the great and so if to integrate all your files into being being and immediate and doesn't detected and
I'll links 1 all this hype which you can find to our tools following your emotions they research and then dialogs was all articles all reference and
thank you for your attention question please How have so anyone that has a question for making these line by 1 of the microphones they are 1 2 3 4 on the side of the room and 5 6 7 8 and that's the room if you are watching online and we have a signal was monitoring the Internet's for all of your interesting questions and they will be and it's already here microphone number 1 is a mention of the emissions that will not their on and this is a list of your last visit from my was available the become better as the number varies from my fuzzy and this is the same you know no we found the this some difference but feature correlate with world and you have very passport starts internal protected mode but the thrill world starts internal the remote parties authorized function is always the same what we found of some difference in cryptography but I think it is not important so if you if you were leaving please be quiet so the talk is still going on we're still having questions and answers and please be considerate of the people asking questions thank you so the next 1 from Michael number 5 and yet those use that the personality register to red and then you reset the and the initial rate reset I'm is that registered persistence over we will so we have to do the exploit set it every time you need to do it every time this is the only city is on the deceased movement between or results Signal angel is there's a question from the internet yes they'd like to know where to find the internal news the port on the main board story literal progression the question is where to find the use the board on the main board for the j-th of how I know all of use the imports uh now has access to all of the different functionality you'll that don't need to find speech sports on your system if you have the platform was uh Scott lakes are you always has a functionality when you use the boss although of course the this force on link directly to this stage if it if it is there boards a linear connected to a we have a sample and another a controller and you'll probably don't have to say on the spot microphone microphone number 2 so that the war means you can extract and the key from and the need for example is gx animal does the station I don't know where we we are starting to sort the research of how many you relates with PGx and to be and I I don't know of how how key and the and to extract the D derived and toward its and relate was side answering like a phone number 1 did you receive any um them many messages any recognition that about this from Intel you mean that the and a the ability to be this information was until did they react to that did they react in any way to that after all not we use a set of OK what alkanes so nothing much flow pattern of signal angel is there another question from the internet you know how can you do that is able the today access here is just the same thing the IM and maybe enough or what do you have to do sorry you mean on power of until the little disabled and decide functionality for any and how can you how can you fix the methanol how could the into the the the organ is if you your own system it is not so it is this feature does not bark sorry and you'll don't have any chance a chance to switch on the internet for the mean if you don't care if you talk or you don't have vulnerability and so on and it's actually a means to the exterior of dosage on only and into the but I will do model it is into in about model the so we have form that would and other model for example the in the in the uh Mars and do it the the end of the fuel 52 it's it's feature eaten by you you grandiosely use which both the series 1st descrip tor and the had to fix this a problem which we found in last year last year and it until that OK like a phone number 4 in the back I leave 1 of your previous slides mentioned that they incorporated job of legitimacy 1 God so that they do last how I know all along this is so it is don't all and so it has some of the related with PGx when I I don't know details the so microphone number 5 of the last flight you mentions the extraction of flow but from piece of there a simple question of oddly enough to sign a fervor update the uh which you would modify so that that we need to accept it's the no sorry and pleaserepeat of good OK so let me rephrase what I understand of uh you I'll give you as a person where sign it's a by a public until public key the I don't have private key off until and as the sky is not of built-in into a new it is put on it is on the plate from key as is key for semantic of the symmetric encryption file so that's fine it's files on a file system but if you have the sky on you can only modify found in the file system but unfortunately is that of a execution model of the stole the in in other places at the time I get it so go easy pot or death rates as the probability and yet at the thank you thank you doing but can you have only free software running on DMB the sorry please repeat Christian formerly had can you have only free software running on the and the by modifying the last column the I don't understand sorry hit on new meaning that the so how call how we will we can modify zoophile systems I'm not yet replaces the the MB of RAM by offering now known for since it because I read we a
change in the world a of is a chain between oral and about model and to e to change of journal of in the hands the BOP model I don't know how to will use its functionality for a change in the dual open-source solutions all but the year of course you can to do so you can do special devices these detect functionality reach to replace after rebuilt all EU from receptor top and executed by the need to sign reduced somehow of some of in in the impossible as think microphone number 2 of anywhere where the minutes image has been leaked somewhere where perhaps it could be downloaded and analyzed infections there are take the Journal of the only based on Linux and uh the into various almost all too low to write all almost all drama and so on so ingenuity and maybe if indeed you can uh get information from it so after signs and sign indeed I denotes the microphone number 8 they thinking do think it will ever be possible to add your own public keys are at the end of the week the assignment Thurmair stored in a room yeah or sorry you mean the what you could could you at home public keys for signing them are they said not possible because the enemy checks the public key that is of In each success in immediate checks on live on the 1st for the key entering all that the wrong case of that in the 2 makes a lot of them version of the new which signed on to these and we uh so only 1 keys from from and so on he is from checked that room check so of the shower from public key exist in the you know on the right white list the has a hot core it's 8 years later the precious ofthese and 2 of some least for there some white least and all in those suspicious and it's a few keys insists least you going around in you and me for what the somewhere agreement that list of hashes in real or near other thank you Signal angel what's your general impression of the security of having the whole wall is that to attacks the story of you mean how Abu you mean colorability to help us to do each sorry and and the whole model is it to other texts on the other end of the model year start another 1 and in other modules so I think the question is in general how good is the security of the Intel and so sorry I hope that at me general help with this period the home isocenter officiers because of some is in demand and researcher can use it for dynamic analysis of in the court seats for each school I and microphone number 7 do you have plans to uh research some specific parts of the interval and made In the future the of course the until to real a little real published immediately alone version and 2 I know is that of they changed Huffman tables for example and this was the next and those electrons of this game and will start at is another question of microphone 7 some so if I understood you correctly just to make sure this means that you if you have a CPU of this dialect architecture you then use the free ports you can always get low-level access to the and exactly how mn so if I were to own such a chip I would want that patch what's the usual some past does that does that come with a new Windows patches update or what is it so you have some some ways took 2 0 to use it if you have a state program on your own you can write flesh you you mean how we uh how or how you can farm export data to its here below how does how would help sigh how will entail and distributed patch for this vulnerability all unfortunately because their don't great always possible I think you're being told in parched only there'll be in about function but are a researcher or particular can always to them greater ocean all tool the only In the ants exploited it yeah the resulting problem the a is that the controller of all this data around and might be another way of saying think your like a phone number 1 and that the more we did you that we saw the connection between the 2 machines with this blue box on that but I think there's another 1 as a way to connect and was that just the USB cable there is there anything you can do with the blue box that you can't do without this year read rejected our is only use these 3 different cable but it is not a a possible false because our we need to also in to recall as a state of what for awarding in the uh I do it but I don't like to that because I need to stop the execution of former or for 4 of for my research it's easy for me and uh because we we using uh blue box think signaling do you plan to publish of Moscow come in the future here and will point to to do it here signal into just give me a moment don't I don't know maybe what but to Moscow the I any other burning questions please come up to 1 of the number of microphones but with the with people at the moment we more and more of the how what to watch the
reasons if you the the thank you hold it the we act it
Addition
Hardware
Datenmanagement
Implementierung
Systemaufruf
Ähnlichkeitsgeometrie
Ausdruck <Logik>
Programmfehler
Übergang
Intel
Datensatz
Datenmanagement
Computersicherheit
Ising-Modell
Hilfesystem
Standardabweichung
Schnittstelle
Hydrostatik
Computervirus
Versionsverwaltung
Datenmanagement
Abstraktionsebene
Twitter <Softwareplattform>
E-Mail
Analysis
Intel
Datenmanagement
Reverse Engineering
Dateisystem
Speicherabzug
Vererbungshierarchie
Computersicherheit
Dateiverwaltung
Bildgebendes Verfahren
Demo <Programm>
Schlüsselverwaltung
Kategorie <Mathematik>
Konfigurationsraum
Kontextbezogenes System
Datenfluss
Arithmetisches Mittel
Flash-Speicher
Systemprogrammierung
Message-Passing
Schnelltaste
Hardware
Betragsfläche
Computersicherheit
Systemplattform
Datenmanagement
Routing
Firmware
Zentraleinheit
Systemplattform
Intel
Komponente <Software>
Integral
Wurzel <Mathematik>
Benutzerschnittstellenverwaltungssystem
Computersicherheit
Booten
Operations Research
Hardware
Analysis
DDR-SDRAM
Gebäude <Mathematik>
Virtuelle Maschine
Applet
Sprachsynthese
Mikrocontroller
Zentraleinheit
ROM <Informatik>
Raum-Zeit
Coprozessor
Data Mining
Intel
Datenmanagement
Prozessfähigkeit <Qualitätsmanagement>
Netzbetriebssystem
Festspeicher
Code
ATM
Mereologie
Speicherabzug
Zentraleinheit
Stochastische Abhängigkeit
Implementierung
Resultante
Schnittstelle
Punkt
Prozess <Physik>
Quader
Atomarität <Informatik>
Gruppenkeim
Kombinatorische Gruppentheorie
Systemplattform
Intel
Physikalisches System
Deskriptive Statistik
Softwaretest
Typentheorie
Abgeschlossene Menge
Datentyp
Speicherabzug
Gerade
Schnittstelle
Einfach zusammenhängender Raum
Lineares Funktional
Gerichtete Menge
Protokoll <Datenverarbeitungssystem>
Physikalischer Effekt
Systemplattform
p-Block
Physikalisches System
Mechanismus-Design-Theorie
Coprozessor
Gruppenoperation
Software
Diagramm
Gruppenkeim
Gamecontroller
Information
Zentraleinheit
Verkehrsinformation
Standardabweichung
Lesen <Datenverarbeitung>
Partitionsfunktion
Hardware
Architektur <Informatik>
Desintegration <Mathematik>
Datenmanagement
Parametrisierung
Hecke-Operator
Systemplattform
Eins
Intel
Arithmetisches Mittel
Bildschirmmaske
Datensatz
Token-Ring
Funktion <Mathematik>
Font
Software
ATM
Datentyp
Computersicherheit
Programmiergerät
Gamecontroller
Speicher <Informatik>
Partitionsfunktion
Schnittstelle
Subtraktion
Stabilitätstheorie <Logik>
Server
Hauptplatine
Bridge <Kommunikationstechnik>
Mathematische Logik
Gesetz <Physik>
Ähnlichkeitsgeometrie
Physikalische Theorie
Intel
Spezialrechner
Bildschirmmaske
Datentyp
Speicherabzug
Maßerweiterung
Schnittstelle
Implementierung
Kette <Mathematik>
Soundverarbeitung
Nichtlinearer Operator
Lineares Funktional
Firmware
Twitter <Softwareplattform>
Gamecontroller
Zentraleinheit
Soundverarbeitung
Schnittstelle
Partitionsfunktion
Lineares Funktional
Subtraktion
Regelung
Gerichtete Menge
Hardware
Quader
Vektorraum
ROM <Informatik>
Intel
Datenmanagement
Festspeicher
Widget
Speicherabzug
Dualitätstheorie
Zentraleinheit
Expandierender Graph
Intel
Arithmetischer Ausdruck
Regelung
Gewichtete Summe
Punkt
Rechter Winkel
Schwebung
Datentyp
Systemplattform
Partitionsfunktion
Moment <Stochastik>
Bildschirmmaske
Prozess <Informatik>
Elektronische Unterschrift
Quader
Font
Parser
Systemplattform
Ein-Ausgabe
Schlüsselverwaltung
Systemplattform
Einfach zusammenhängender Raum
Resultante
Lineares Funktional
Schlüsselverwaltung
Stellenring
Systemplattform
Elektronische Publikation
Kombinatorische Gruppentheorie
Intel
Puffer <Netzplantechnik>
Informationsmodellierung
Einheit <Mathematik>
ATM
Softwareschwachstelle
Schlüsselverwaltung
Modul
Intel
Schlüsselverwaltung
Kontrollstruktur
Code
Kryptologie
ATM
Speicherabzug
Softwareschwachstelle
Wärmeausdehnung
Tangente <Mathematik>
Dialekt
Modul
Softwaretest
Hardware
Abstraktionsebene
Systemplattform
Debugging
Physikalisches System
Abstraktionsebene
Entwurfssprache
Systemplattform
Intel
Physikalisches System
Software
Bildschirmmaske
Software
Typentheorie
Firmware
Speicherabzug
Ablöseblase
Zusammenhängender Graph
Computerarchitektur
Zentraleinheit
Soundverarbeitung
Spielkonsole
Vorzeichen <Mathematik>
Gleichungssystem
Information
Intel
Quellcode
Deskriptive Statistik
Physikalisches System
Druckertreiber
Programmbibliothek
Verteilungsfunktion
Programmbibliothek
Datenstruktur
Druckertreiber
Korrelationsfunktion
Instantiierung
Schnittstelle
Lineares Funktional
Konfiguration <Informatik>
Knoten <Mathematik>
Hardware
Kategorie <Mathematik>
Konfigurationsraum
Physikalismus
Abstraktionsebene
Mathematische Logik
Übergang
Intel
Physikalisches System
Einheit <Mathematik>
Differenzkern
Reelle Zahl
Datentyp
Speicherabzug
Bus <Informatik>
Zusammenhängender Graph
Speicher <Informatik>
Versionsverwaltung
Streuungsdiagramm
Lineares Funktional
Konfiguration <Informatik>
Elektronische Publikation
Punkt
Konfigurationsraum
Gruppenkeim
DTD
Zentraleinheit
Dialekt
Integral
Chiffrierung
Advanced Encryption Standard
Minimalgrad
Code
Speicherabzug
Programmbibliothek
Garbentheorie
Konfigurationsraum
Schlüsselverwaltung
Verkehrsinformation
Einfach zusammenhängender Raum
Elektronische Publikation
Hurewicz-Faserung
Konfigurationsraum
Computer
Programmierumgebung
Computer
Zentraleinheit
Gerade
Rechenschieber
Chiffrierung
Reihe
Chiffrierung
Standardabweichung
Code
Mereologie
Speicherabzug
Körpertheorie
Programmierumgebung
Kette <Mathematik>
Momentenproblem
Physikalisches System
Demo <Programm>
Dienst <Informatik>
Minimum
Speicherabzug
Elektronische Publikation
Fisher-Information
Physikalisches System
Programmbibliothek
Dualitätstheorie
Dean-Zahl
Bitrate
Tabelle <Informatik>
Krümmung
Momentenproblem
Kontinuumshypothese
Gebäude <Mathematik>
Zentraleinheit
Systemplattform
Intel
Magnettrommelspeicher
Task
Vererbungshierarchie
Dean-Zahl
Auswahlaxiom
Schnittstelle
Dean-Zahl
Prozess <Informatik>
Elektronischer Datenaustausch
Binder <Informatik>
Nabel <Mathematik>
Arithmetisches Mittel
SLAM-Verfahren
Thread
Einheit <Mathematik>
Rechter Winkel
Ruhmasse
Leistung <Physik>
Zentraleinheit
Aggregatzustand
Intel
Addition
Virtuelle Maschine
Schlüsselverwaltung
Konsistenz <Informatik>
Hyperbelverfahren
Code
Huffman-Code
Systemplattform
Dateiverwaltung
Nummerung
Vollständigkeit
Elektronische Publikation
Eins
Resultante
Hydrostatik
Datenmanagement
Computer
Analysis
Internetworking
Intel
Vorzeichen <Mathematik>
Prozess <Informatik>
Kryptologie
Code
Mustersprache
Computersicherheit
Dateiverwaltung
Hacker
Gerade
Private-key-Kryptosystem
Lineares Funktional
ATM
Güte der Anpassung
Reihe
Bitrate
Mustererkennung
Web log
Arithmetisches Mittel
Rechenschieber
Forcing
Benutzerschnittstellenverwaltungssystem
Information
Schlüsselverwaltung
Message-Passing
Public-Key-Kryptosystem
Subtraktion
Sterbeziffer
Selbst organisierendes System
Zahlenbereich
Sprachsynthese
Hauptplatine
Systemplattform
Whiteboard
Physikalisches System
Informationsmodellierung
Bildschirmmaske
Arithmetische Folge
Software
Stichprobenumfang
Arbeitsplatzcomputer
Systemplattform
Mailing-Liste
Physikalisches System
Binder <Informatik>
Elektronische Publikation
Datenfluss
Softwareschwachstelle
Zustand
Public-Key-Kryptosystem
Telekommunikation
Momentenproblem
Quader
Mathematisierung
Automatische Handlungsplanung
Versionsverwaltung
Zahlenbereich
Fastring
Zentraleinheit
Hypermedia
Medianwert
Systemprogrammierung
Virtuelle Maschine
Informationsmodellierung
Spieltheorie
Reelle Zahl
Vorzeichen <Mathematik>
Hash-Algorithmus
Bildschirmfenster
Optimierung
Hilfesystem
Bildgebendes Verfahren
Einfach zusammenhängender Raum
Lineares Funktional
Computersicherheit
Open Source
Mailing-Liste
Störungstheorie
Frequenz
Modul
Dialekt
Patch <Software>
Verkettung <Informatik>
Softwareschwachstelle
Mereologie
Gamecontroller
Dualitätstheorie
Speicherabzug
Kantenfärbung
Computerarchitektur
Information
Schlüsselverwaltung
Tabelle <Informatik>
Aggregatzustand

Metadaten

Formale Metadaten

Titel Inside Intel Management Engine
Serientitel 34th Chaos Communication Congress
Autor Goryachy, Maxim
Ermolov, Mark
Lizenz CC-Namensnennung 4.0 International:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34940
Herausgeber Chaos Computer Club e.V.
Erscheinungsjahr 2017
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract Positive Technologies researchers Maxim Goryachy and Mark Ermolov have discovered a vulnerability that allows running unsigned code. The vulnerability can be used to activate JTAG debugging for the Intel Management Engine processor core. When combined with DCI, this allows debugging ME via USB.
Schlagwörter Security

Zugehöriges Material

Ähnliche Filme

Loading...
Feedback