Bestand wählen
Merken

Intel ME: Myths and reality

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
at a it
and the the kind of a a
is it always features for the next are gonna be L but it also opens the and the goal of but both of them do revisited in full of fulfillment for living the rolled a couple of Python scripts to disabled the internet but engine so but and installing electrical engineering at the University of Milano and 2 days ago speak about an intimate been alone and layout research and fights for a lot of move but troubling around the world and around the Internet for the house year olds or he would include the details thank yeah this test inherent game think area on preventing the spread of people the 1st time because so many for the few mothers we'll see anyway just a little bit about me yeah comes after the order of little pumpernickel hits race but in my free time I'm sorry messaging and so happens that the company develops a software for reverse-engineering so that's a bit of with his I think I'm not procedure share some some of my my day job is just so that you meant so this is just my program so to speak but does not permitted a bit of hiking if it as this is the Amazon Kindle the 1st version Zebulon he added a bit of both blogging about and you know have this was the 1 was 5 founder CEO portends and at some exact inference system anyway so there to this 1 just just just a bit ground and I get army and the offices this staff hope you find it interesting I know the color of ieee dual-hop euros Anthony and I'm interested in do-it-yourself part our and currently and their sites engineers student in the Politecnico di Milano and I'm not research is the security researcher I like to be my own stuff from scratch and and I really like this to be merely a like this 1 Bulgaria
industrial disclaimer that all that we have here is information either from public sources or Florence to pursuing of course there always a you can be sure that everything that we say is is is co-funded % correct is just our opinion and it may turn out to run in future and we don't have any engagement of any specialists ships all persons that detail in this a is not and endorsed by endorsing like out yeah as no so just a bit about what is in the linear yeah I mean is nowadays if it means management manageability management engine but that it was college mitogens was quite a big thing in the variant 2000 I was and as and it's a very non idle just as the court and their security and manageability engine or just converser engine so depending on which generation or reached that mandating may be called different things but is basically all the same scene and immobile on the performance of these of additional doesn't majority of the it's a little cut down and 1 of rare but it's also seen rushing and recessive what forms into sort of authorities also a version of new indifference reports for utterances so was the most in all of one's nowadays they have some relationship and what is it what is used as well indulge endorses this on the frequently asked questions page given to me in literature-based platforms useful Cold park compute subsystem which performs various tasks that he I got things because of past during new uh while computer-ese rain during sleep and so on it must function corrected to give them most the forms and collected from a to C so it's a bit vague government that's what they say and the yeah what other people say yeah resembles some people say that the survival rate for friend and it has no useful for us and of course I guess so you can blame me as well because my 1st presentation on this topic was called but you'll talk you just to be the explanation about it and when I submitted the structure at the beginning I was looking just at them and assess the German that until was using but then and that 1 did indeed the word like like a a gift but in the process yeah have this be of firm of habits that I get easily destructive and that once I started looking at the at the at this point is that I found that it's implemented in the Delaney and then from there it's kind of was also in all kinds of seas opens the highest of looking into what what else is it isn't any and so on so when you anyway the I might want as a result the security because it was just a kind of a little bit of big bipedal to get my submissions accepted just accidents I am so and this is for example article from they it's a bit difficult to ideas so I will I will I believe the sum of the it says among other things so if the microphone which has the effect of everything in the computer every computer with an Intel chip made in the last few years has 1 and if you're looking for a perfect took the far effect you want findings and that the runs on me is the case seen a computer and this fear is composed by ignorance with no 1 knows what any connection at all and without being able to 0 it is a good thing and they mean nominal signature was little happen when is broken open yeah so anyway this is just 1 article but there are many similar articles and yeah and so on and so for example on those
this of this discussion and and 1 process the composition there need also makes me believe that info is not entirely responsible for the me I imagine that and this a and other top people at the end users have had their fair share of the responsibility for it to no of course as it is for those who was perceived you know 1 another example on for forms the US government can still make demands of what it should or shouldn't contain the government has a long-term plan to that it is in the u is of course part of the plan the or in a c is just on the general and some recent years there was a session her body meeting the success with means and there's a great but how can anybody quantities that you give feedback to the end of a computer that has full access to contribute labeled there is no need for high because it it built in hardware beta but that is any firewall which is 1 of the new Wi-Fi signal can be disabled and so on so here's the false answer this game but you don't have a strong so we might be enough to give this all this thing I I think that's most of this kind of scary scenes are quite far fish and and just to answer but before the 1st question that even has no no useful for office and I see no it did not have for just because the especially has no purpose that you don't see it covers the news and there's no purpose I so initially and was created to implement there's something called painting to solve real IT problems and what the what are those problems so just a bit of history of and then what management so in the late nineties there was it began with an people have made under those but didn't want to have a monitor and keyboard for each 1 of them they had something called the what media speech while at the Cupertino mouse as in later on you appear the standard provides for management which included among other things we go on and it would execution environment which are still in use of nowadays then the IBM introduced article 1 that although it's never got to send their of in case and something happens was going to the but it was just 1 way than in 2001 until the reduced artists and the from what 1 which a lot of sense of summer sings but it was you did you did beyond and that have noted Egyptian to to do so it is evident option and improve some but it's still work was not a big enough for many years this and just yeah in in the background they did this some research was mania enterprises and they announce something called Indian 2004 on into the local forum and the amount of vision they show this picture have a new technology which allows all this and ASF also policies and of course anyone in in the press was is this different features all those green and and this think that's anybody remember withstand a need to have it and this was
over so when you it is it is it is the 1st version had the Moon in hidden inside the network cards will not not cut but an intricate achieve which was on the motherboard that it had the features which are not supported by year of you some of my understand itself for example that idea direction so you could an amount of an image over the network and worked as a more complete over it it could say all alone so he could have still canceled good yeah for them in the use or operate the ISU xml always modes of and all the same about them yeah than the disease this stuff that they're working and improving it it was very popular and they decided why do we need to put it is never got list for the decides there was rich and have some space is just a synthesizable core it's it's not a big deal and the move was forms can have it then they do some more prominent so for example in and so on this path of the reasons the 1st of branch of this the resulting t to support 1st of mobile users for example QST is quite system didn't quite system producing uh basically fund management I so when I was a pro-Soviet cut it tells the in the country of 2 at around the funds so it gets a little colder so basically something's up the waters out enrollment of the mind to be and I guess they just have the so stressed and they decided we can have this feature and due to the improv in the work of our set hardware so why not do it they also had to be in because people started well people but stopped in the other was initiative by Microsoft to test computing and to be among some that appear at and they decided way right people need to to have an extra chief and spend a little more spend more money on when we can just do it inside and it to be cheaper for people and so on so and then the other is the the 1st version of underserved I didn't look at it but it is unjust if estimate the has some sores mainlines they they moved to so called we would call intonation told the they switched to a defensive you do more efficient instruction set and their also circadian supports so obviously what what what had to be done in hardware using external switches knowledge could be done over the network so we could have full control of the computer like this is a video use a mouse and keyboard and so on the used a version of the interparticle yeah anyway just some milestones they're not really interesting against of contempt so I so the summary is of the is it was created for this in the appointment management coordinating who is or what what they called it the broadest umbrella term which is not really completely defined but dimension is a is a is a also ordered other features which which are not related to empty but just because they could be useful and the the heads of putting it in so that meetings for example 1 I didn't mention his ITC integrated goes core control so previously you you you had to have a separate cheap on the other about the what which was it possible for converted the clocks now it could be in the integrated all Institute sets and this again the customer saved on the and Abilify jails and the it will also be more secure because once the costs were set to 0 looked and they could not be controlled by other software in use as a as so you couldn't over T 2 computer accident in the of course I just was added also part of it that and then a complication order for a for that it says implemented a one-time password for example and 1 feature writing was that the light was or count capability for for punching bags and hardware that you see it had they had to replace the entire chips and nowadays they could just using you from and the boss would be fixed so think is there a kind of modulation for all those things so my sinker it's kind of reasonable that they they added this to me because they has a procedure and it says that the money and there's across and the 1 for do also say that it was in the and there's a control but this is more than as a you know instantly that it was this concept when a list of current agencies into lot that uh is a bit that with all due to disable and you so that doesn't plan for the rest of it was operating theatre order off your computer and then if they can't control mental why would they present it it does it does that make sense in my opinion and here's a post from from eye on factor news and he claims to being dimension and diversity of it hutterian and he says I worked until in the 1st 4 4 a guild and those 2 things and he was not born out of the that is found people nor was it due to the best of my knowledge created at the request of you the government or others it was an honest attempt at providing from to that to believe was useful for that means it was easier to be going much worse very piles with actual customers such as lot we did bank will but went to an old more stuff I think of full G and we have a lot more direct access to the land security concerns discrepancies ideas pretty on in the text I personally believe the whole thing was about year and everybody seems to the few is 3 to complement for it but the thing was never in that is a bucket ice in up so I I kind of tilted every was is so I think it's kind of sums up correspond out of control and it was not the demands
to being as bad as this turned out so a a bit more about other means so people say that it's always on 1 2 is the use of it was kind of true but if it has some some devices to sort this is a bit about any of our states and so when the RPC on and he is also working and ever since we have our 2 but when ABC sleeping and he can can be in different states and for example 1 of status called M 1 so abuse suspended but any functions it has access to the test said the data from which is which is working it to us to some and any systems are working and the 1 so is it something mild expires it goes to all states and in that case in the the trumpet Board of so it works for a bit and then goes off but it can have so-called wake mode so when the packet comes or on the 1 hand and active it to accept and can handle the request so it's a kind of 4th but not completely off but anyway it's so or when you are not going to the user itself in some cases you can get to it and the bias if you have a meeting here's a picture you can can can fear that it's feasible to do so the only only in 1 the candidate is on order 1 computer is is it it can be also be powered if it's only the power and so on so this setting depends on on your system and sometimes country rules about not so another 1 and it can walk as C at the common and over there yes it was kind of true and for some time but it's not a more so 1st thing in the Assembly which has this this dt which means that the dance models of intercept and it was only in the present in the meetings 4 4 9 2 9 0 intended for the world and therefore for this to be in the possible is more needs to be it enables and you're going to the needs to be enrolled in Santos of forum because it has to be periodically thinking is a server concept as this is additional foreign and yes it had uh force refinement has support for CGA and the CG ships have to be connected directly to the chip set for example if you have that you have been deemed with CG it wouldn't work on it was built built a module and this comment is Todorov tool to kind of big is this you have to be signed by the so it had to do do was trained Osiris to be active and eventually into about 15 into they and it's completely 1 so it's not present in the modern PCs and also I site finds solutions which overt didn't use any they all user and a bias so you find model which fortunes over system level so it's a software agent new so other ones if any at all that and legacy and it's it's a bit complicated so it can it can it there's a constant so for example if County the 118 it can maybe by some or whatever is that it will the cause of the data to bit from from from diamonds and this is the data from them but it can boxes 102 as as far as I know of course and according to the condition in the in the book about I mean this is defined as a block from those these forces for samples SMM is walked and can be read by this game agent it has a bit of Fox's indulge appeal but as far as I know it has it has Marshallian access to the pixels so it can kind of and then data from from from the angel diagnosed as a GPU and under the gage change but it counts that indicates the data however is a is a bit of footnote so to speak it can emulate the ID audio device in the causal it's good with to defend the image all that many could with deficient in which named the and then of course the good doctor the file system or work but this is not directly on itself it's something that you send me and 1 all this is all about education Dauphin me so in in any well and matching was talking yesterday and he claims to have access to more device from across some assuming this is situation has changed so I don't know so it can be some some some but not everything and some people say it's about Balsa-Canto didn't just you up and the symmetry example is a is a treat from the noble our on on the job and he quotes his friends who says it was the uh the fall to the carpet dark which will basically this uh insists is Abram additional justification and he says well rehearsed association how the your break at so is this diffusion of the every as must share of the lead this every time it says must not objects that they did
not everything assist should assume that they did not do it and therefore it every time it makes crime and that doesn't affect virtually the assumes so it was done on the right is from company and what we did not just because it's still works so I knew it I think this thing also supplies like well for interlude on the 1st stations but you have found accommodation would escapes areas floss for example fluctuation for and remote parameters so on so you can also do the same thing just fall specs and and see if they live fault corrective and maybe you can find some books and the and the nations that is what box auditing so plenty of public so I can can be audited his outsourced and our deep disposal source and just as a kind of points to the my previous slide there is a master status by what was he goes to the very In into and then call security region of indels partly measurement ecology so also all his work he did not at all in all the and University and he just said that accommodation provided by Intel and had tried to talk to talk to wait until any or all the time in the painting and see if you'd activated the way he describe and he tried to find some kind of course in this discussion that he did find some things which of course should fix of later by the what and sometimes there were here kind of box for example Intel says that in the should not be thinking that tuition Serv before it goes to stop mode but you'll see fonts up in some cases he he does thinkers activation server so quantity of it was not completely implement quarter by and the in in the later Russians it'll change the way that theory and the ticket tuition walks and now it's more correct so you don't have to to have the source code store sometimes even you're until to just for you and that even if you don't have source code you have the a binary code is a mice available flesh it's not completed for now so you can just figure out for the Saturn just using all the quality what it does and then I think it's it's the approach so when you have the binary code you see what is actually being executed so you don't see the comments you not confused by commas my advisor enablement awkward for my thing like member the to fail articles in having their encryption called not encryption items remember something this miscues anyone's a little too which was invented the in and was not obvious when you're just lots of the cold yeah so when you went have and by it's kind of companies such things the the and you don't have the commons but sometimes commences at intervals tail and the matrix a major currencies results period true anymore and the by nature because the yeah 1 downside of course it's it's much it takes a lot of more time but that's life the and so on just to summarizes there was some boxes of that the fundamental assumption and you just mentioned used here it is but user as he found some issues might be just made things that work getting activation process and and trying to to to change something sins are as there will not be usable songs year there is this year about the empty they just could be sent to the again the and level was on just looking isn't a that of traffic again and and things so results source code again and that was the last 1 the Wizard buffer full again was founded also just but to consider combining the binary code so just to summarise you by box and you don't have such quote you can already do and maybe you can even get by without a sausage in of course is that usage in my be but you can't I in my work no by machines and you can write it undetectable rootkits for it still says an undetectable and indeed there there were some attempts of making appears for the generation 1 mean in particular in 2009 at but cuts was the station by individuals survive was 4 is the first one the 1st research on this on this topic they found the body in some viruses which all the test the impulse I limited area and the time it was just plain text called solar by could not using and they could inject some code into India Ltd and gives called the so this all of them to tool to kind of have tiplexing but it has some divergences it have to be infected which he when he she would yes and then and since then I have all the uh sort of simple interface that they've written very shaken so you cannot call intervals the 16 year or modification of the detected and injected the finds emotionally boat and then there was a but extend whom who made some who who want a book on detecting the that's so I think it's not it's gonna considered undetectable anymore so candidate they made by some side effects and it's also still still
anymore and there are some people say you are cases of seeing is there and you can remove it and you can they sing so I think it's an if fluency see what what can be done about it so what about the 1 year ago I started playing with core would and I ask myself if I could remove the limit humor and unfortunately their labor would have fate you page had the answer and it seems that the before virtual 6 8 was possible to disable internal any just less removing get the femur from this by flesh unfortunately this isn't available anymore because starting from version 6 so if you remove the evil and if you're aware of entity with the non and that with enough of after 30 minutes so it seems that there it is not the technically required it seems like an artificial locker so I started looking for a way at least to reduce the American and they found that these messages on the corporate mailing list by term about some of in which he tried to remove parts of the intelligent humor and he found out that they we still turned on without turning off up after totem units and then a few days he found out that you could after remove parts of the Interlinear without compromising the correctness of the system so I tried to to his work again and to avoid doing their things by hand there without access to torus of the writing any cleaner which is a vital screen able to reduce an Intel any theory mention to the meaning will not the major needed for a court boot off at scene so 1st of all look we're seeing humor was where is it located it is located on the same cheap but as the by you if I so reading and writing it there is quite simple because you can either use an external programmer which can be a cheap leads border with an SDI interface or a dedicated program out or in some cases you can also use the Vandal tools to flesh out the bias to the sample and the right again that your modify and now this is possible
because there it's by cheap in the in the last instance our partition of the so this is this the moment you have data the flesh descriptor which contains different potentials inside the the SDI cheap so we have to describe the region which is like a partition table and then different petition for example the bias for each other and that the Internet means fewer region all we want to use the interferer so we just have to extract and we can do it the really helpful of i if the 2 will from the core the project so the 1st step but let's try to remove every partition from the femur except that for DFT are which seems to be the fundamental needed for the court looked at indeed that they implement humor is partition of that this is a very simplified schema and so we have an FTT which is the film a partition table which contains a list of the petitioners inside the the femur image In this image we can see that there is the FTP are autistic or potential and the an FTP partitional which is the potential with the network stack and AT and T removing this petition is quite easy because the inside the FPT with these entries and each entry has the offset and the size so all we have to do is just to remove the called the from the opposite to the off the plus the size the partition are about that they are assigned individually so we can remove the whole partition without any major effect because the signal to what's inside the partitions so we remove both the code and the signal moreover the FPT is not sign that it just as a check some so it's quite easy to remove everything we want so I tried it I flesh batteries are the results on my PC and it work with so this was the 1st step of the next step was to try to remove the errors that the main modules now things are becoming a bit too complicated so let's review the layout of the interferer so we have that the as cheap Bowie which contains different regional so for example the descriptor Tobias and any region inside the idea if you're more aware that we have different potentials for example the a T P R N D and key and inside that each called partition of for example the FTP are where different models the modules can be either Hofmann compress the or else a compressed the use the 2 different kind of compression schemes that because as that the may offer some other compression but it needs a lot of humor to use them on the contrary half not a compressor has a com worse compress all compulsorily nature but that can be done directly by the hour so the user half to compress the early stages small USA and as they for the later stages so different partition also have different structural so about since we kept only DS-TTR partition we really interesting that that and that is a called partition moreover the internal structure of the island of fortition changes between the different into new generations so judicial 1 is not of our interest because it only could be removed completely so no problem for us and let's focus on generation because the stuff from that so deserve internal offer generation tool called partition so we have a section that is a manifest which contains the ROC signature were off the list of the models here we can see that we have different modules and each entry has named the office of the size the compression type and most importantly Hessian this means that the models are not directly assigned to each model is half the and list of the Hessian is then iron but luckily for us the hatches are evaluated the so in evaluating the Hessian of the model doesn't prevent the loading of previous 1 this is important because it means that you can that we can stop but the bulk of the system by invalidating the a modular ordered sequence the modular will not be loaded with the previous ones are OK so I tried again I updated any key there and I try to remove every partitioning DFT our as that of a compressed the so that only 5 modules that were kept so I fish better the result and it work again so at this point I had removed most of the called the but there were still the half my models and they wanted to remove at least most of them the the conditional line for the half modules were very work so I relied on the source code of honor which that the compressor for interlinear generation tool for the other models and the recovered destruction so why he has suddenly modules were just a single block of the town from the offset to the offset plus size d half on compressive modulus are fragmented so there is a single line a partition share of months 3 months and we have the and that allow you to which stands for local lookup table which contains a list of entries that has a valid flag and the offset the the offsets pointed to the mom chunks so which are a fixed size the uncompressed data but from our point of view since we're seeing all compress data they are variable size deserve LSA complex Kemal was probably used by held to further shrink they have 1 compression because in this way different chunks can view reuse uh again in different model models however once I understood the structure of the is there all I had to do was to create a white list of the modules and couldn't be removed because the addition the are part of the partition of the model that I want I don't want to be removed and the removal of the others so I tried to remove their moduli they're less important name adjusts will start which was the FTC S and I flesh vector result and it work again so I moved on and I tried to discover which modules so we're really needed for the affordable and they found out that all 2 models were needed that these 2 models were debut which stands for bringing up 1 which is the more the 1st look modular which initialize all the system and the 3rd SOV the for 30 minutes watchdog the wrong key part on the modulo uh which is not always present seems to contain a some sort of configuration the current by be but it's very small something like 2 kilo by so I'm not a problem interesting gay and there is no kernel now because the kernel model that has been removed so it seems that on generation to it's possible to have a fully functioning go a PC without a care no running getting into so next step recovered the free space why you because I was using codebook and they keep telling me a few more images was so something like 5 megabytes logical to remaining after the removal of so much much less and they want to recall over that space because of I wanted to store a Linux kernel directly inside my spy chief might not have so I started that just by truncating the image it just after the let's say the last valid model and that toward the may well debt was expected because did space that I had removed that wasn't meant to buy anything inside the so I could easily removed but that that also that wasn't enough or because the lessee for example this human between the FPT which is at the beginning of the NE major 10 DFT DIR which is our partition that we must keep that the there may be other party shells that they had previously moved them and now they're not there anymore so I have the FPT something like 1 megabyte of FFA and then finally my code that and I want to recover the space so i have to figure out how I can move the partitions and you may say whether it's easy you just sort of move the code that you correct the entry inside the the offset of that entry and sold unfortunately on the generation to it's not possible calls uh well it's not that easy because it seems that that summer offsets inside the DFT PR partition are not to really to the beginning of DFT petition but they are related to the FPT so you can't move accordingly of adjusting them as well it
took a bit of time about I was able to found them out and the likely they are and signed so after many tries and became a laptop many times i.e. found out which ones where they're responsible for this behavior and the corrected them as well I flesh make the results and at work again so this is the current situation starting from a 5 megabyte C major we have now the and that 84 kilo bytes the major which is moreover up for a lot of free space because as you can see there is the FPT that go just the header some pointers that it began the 50 kilo bytes of data which is the real data and then that so starting from 5 megabytes now we have let's say 50 kilobytes have and that just 11 idea is is the size compare of of my you know just so you can see that the most of the space is dedicated to the network stack and the 2 Intel in the we have a small party not of STT art loss is more partition of the F F s which is of a system that you don't you can read and write and inside the FTT odd the only thing that we really need for the court put of the PC is that the DUP blasts sometimes they're on the but it is very very small so I decided also to port my work on generation 3 now Donne uh starting in the room single long ago this starting again from the beginning of week duration 3 was much much easier because of internal structure of the petitioner have changed we don't think any change I was able to remove all the parties shells except for FTP are because the structure was the same but internal schema of the party shells had changed and this 1 is the new internal scheme of the called party shells now they are indicated by the code the partition directed the CPU as depicted in the feature in the future so we have 3 different types of entries of which are the name of the partition adult manner which is the all the manifest blasts the extension also they modular made at the time and the model beat up as you can see also the signature schema had change the soul of the refuelled modern manifest of science the extensions that so that has she is that the kernel metadata detections the kernel later but the luckily for us that there a lazy evaluation of of the Hessian is is still valid so we can exploit again delays evaluation to remove as many called as many petition sorry as many models as possible so this is the the list of the types of so I tried again by trial and error I figure out which modules were really needed and which ones were not to and it seems that only 4 models are really needed the sources leave the RDU which use them it sometimes a very small partitional like the corresponding of Rome the the kernel this time and the DUP partition after weeks of some weeks later after my work uh deposit acknowledges the researcher shared the discoveries of a metal able to disable in time you so the Coleford my worker and they found a nice serve almost let's say it which was that that in telling the generation tree so starting from our Internet 11 which is sky lake has a kill switch which is the age at the the uh if you want to learn more about the HAP beat I suggest you to read the blog posts here I just tell you that it's a bit that you set these people wonder in telemeters sulfur just off the day's system our initialization the stuff that they're on the off the DUP model goes Kaczynski moreover found a different the 30 hours to any these be them which should should we uh we chose should achieve the same result but on generation to so we have 2 different this 1 on generation to and 1 on tradition tree that are able to soft the disabled our interlinear without trying to modify the code to so the final result is that a combination of of HAP beat and the others to any these evil be is a polar plus the code removal is able to completely turn off of a mutiny just after the Hargreaves and in solicitations moreover there he these 2 the Air Force singular need to turn off and the report the same status to the system so it seems that it is better supported by commercial low bias implementations moreover to check the status of the into any I use the internet to a tool from the corporate project tool it favors the status of hinterland so here you can see its output with uh on I think by the excerpt 120 with the so-called removal so for example you can see the error code that which is the image of a Europe so you try to hold the model but that modular uh hadn't evaluate action and you can see that the free market to complete that has not been completed and the current progress stays in is the DUP fees internees stock trying to load the kernel at but it can't load the kernel because the kernel is not that correctly hatched we did the shown offered the others then you disabled people but you can see that the the status of the economy had changed and now the protease state that is any disabled so different states but to the result is the same moreover 10 uh thanks to the testing performed by the community and I found out that any clear it is not limited to my PC but toward so on any PC from the harm to so the current line of Intel products are covered by any cleaner had as you can see that from a side that you want to do this this uh is greatly reduce the so we go from 1 . 5 megabytes or 5 megabytes depending on the In if Iraq to 84 kilo bytes for generations to and from too many eyes or 6 . 6 6 megabytes for generation plea to 330 kilobytes maybe less all wanted feature of our now gone so all information you nation to there's no kernel running anymore we use the D N. so no more networks 2nd or a anti-foreign interlinear good dynamic application loader is gone and that the platform trust technology which is the femur again is gone OK something bad that can happen sometimes so on May the Caesar and these depend solely on various femur implementation of your PC you can have a freak so that the perceived doesn't for phenomenal the weight you can have a slight the with the nasal some 2nd so before the screen there on on summer biases referred to well bias feature there is an automatic drawback of the indicator of modificational so you flesh and cleaner you turn on the DC and you find that they any humor inside the E. R. SDI flesh as you know uh downgraded to the priests version and sometimes you can also sees the warning messages us so carefully aura into in ways damage the rest of the there's some feature that someone I can I like can argon so 1st of all let you can't have overclocking with this kind of removal because the ICC partition which also 1 of the models removed the by any tuna is now gone you don't have to obviously hinterland the in the in you don't tend to be DDT which is protected all you the apostle anymore so some kinds of may be broken now and the some parts of the cheeks argon lots of stuff a now you may say OK this is good but I want to see some proof well 1st proof what you're seeing these lights they are might seem like the doesn't the intellect and the fully interlending anymore let's see however at the most so we have initially the original of any unit which is as you can see 5 megabytes let's run keen on it here it is good luck and we can see that now the modify the unity is all at 84 tillites let's see the difference between these
2 you can see that the the original and the image has in his head if he may petition the modified as only
1 DFT the our so let's some of the uh current they're running fear might to see if you can see these reassuring messages from my flesh on ignore them and everything is safe let's say extract the hinterland if you were from the dumper OK with I if the 2 will love you can see the Europe because if flesh region to Intel and the adult you know she's 84 kilo bytes let's go for it let's compare it with my modified the major you can see this is the same so I'm running my modified images on my PC less than that sees the current status of Interlinear we've been telling to so as you can see it and if you read the uh hasn't completed the the stock and initializing the and the as you can see in the protease face state the Delaney has been disabled moreover not that the response from on is not compute as for example in telling me cannot give you it's the current capabilities because of that part of the femur is now gone so what can you do well you
can try and cleaner on your system however be careful because it's the dangerous so you may want to have their recall over a way to restore your PC's if it works so well if it doesn't work out of well but please report that both of them are and I will so I would also like to thank all of these people like that directly or indirectly help the main do in this research and know that all this is a useful for just a minute you might have might have some some tools for working with me for extracting images if you interested neurosurgery me I have some stuff out so you can dump the images and extract modules and there's some of them combined I am confident in our region so that's great still have more information about internal structure of me and so you can makes more sense of of the assembly properties of to help for people to instigate more about how it works and discover other things about it and I guess so yeah we can take some questions and thank you all into low and the thank you will want as it was in the slope of the modern world the your music is just article on if you would like to leave please lead to monitor your right hand side only when you but a was from the and the term know all right so number 1 you're can be into the nexus memory man all you may want and much arising from Renault's because it is DMA and the denied and seeing game a loss of over time and I O but then of course I have I don't have currently is you from the inside of me but you can ask might maybe he can try and see if it works he has the fusion in a meal on but as far as I can tell probably not 100 times as a Christian it wasn't really a question I yes so in your presentation you mentioned the work we did a lot of questionable I give 1 I think she has access to people programmer for the buyers Helsinki this kid you always see the problem that we can recover the vector which was working you actually use that your so the OK uh 1st of all know laptop but have been found out during the user to view the research shows how uh I have here my laptop I've read the uh some of the light curve for your 45 times of something like that and it's still working its so that's that partially answer your question uh yes if you have access to past access it with an external program of and that you have a valid dump that you can only use rollback back the modifications and that's why if you go on my date they do you see that I always recommend using an external program because once you have a valid down so you show you should be really careful while doing your 1st time but your always say for example that I've the physical you really broken the SDI cheap but I removed it a so the the other 1 and the 1st make day you months and it's it's the working so if you have a uh an external program and you should be overseas the my from before the question hi hi great all 1st of all thank us more questions and does the removal of the internet you reduce the power consumption of the whole this year's well a little bit maybe because of the reduced bite-size uh I think so but because you don't have been telomere running anymore but the point is that the entire lab uh produce that until any and in in such a way that its impact on the power consumption of there was minimal so I think that the removal of its sphere model shouldn't change much of the situation of all your PC yes on the other hand I think that since as a clock control modules most you my loses its core control also for example the reducing all 4 of the process being that is sometimes used to reduce the power maybe maybe 1 so it makes you consume more power but I don't think anyone has a genetic so it's an open question for now and the did I guess it depends also on on the board on their children learn how conceptually and so on OK thank you along with some of my observations are you guys are in contact with the with the company so just make you could tell it to make sure that the future or something they do not stop signing on stuff this so make this fixes or things possible things so they didn't quite get and you want them to start saying you stop saying no stops on something here in your talk you mentioned that certain parts were likely not signed but uh no I I said then not in the form of this while there's a distant and creating 1 model for now this pattern contains b a b the and people do arise and it does that it's the related to some conduct Netflix so by his is a want to find some guarantees or whatever but there's a resolution marries you still opens you can still extracted and reassemble so I don't think they they want to do stuff and Gittins arrest it doesn't make sense there as model I think is does not uh 2 ions obfuscation I think is just entitled relations as they have to indicate that part just because of so I sizing there until stayed on PIVoT for for for the foreseeable future all much remember to the question all in the last slide so here you have so far more area you met through the and you this is part of the main computers right and policies through so all of the and you make sure all of you can use all of yes it's also this is called the you're mea unified mammography capture much wiser name but this is this what says in a way similar to as some graphic about this work so it takes a part of their of their time on the computer and is also for the use of of graphical device awful for any and this is enforced by the chip set so the host processor cannot access so mn yeah it's like that the source the bias has to come to us to preparing to all give this memory and workers at a justice and advise doesn't does before they just and it can have access to a limited theory and that was there is a kind of that I can to solve neither of the books same user 1st time but for the moment it it's informed by so once the that is that is consider preparing you cannot taxes of mainly from the main CPU but until you could you could access it for both by using hardware adapt so just by accessing other signs along the corridor it'll not be enough for the mentioned this started in integrity checks so can be once it gets but an image into its own around it checks if if should have been modified and in that case it serves as a candidate so this protection against modification thank you all of what is the question of the times of the of contributes to find you have further questions and a on a Rudkin DAC have additions we can talk with others on the form of thinking thank you few was just what you
if you we'd the it could and if the AEC Hey it but back
Bit
Web Site
Inferenzmaschine
Freeware
Gemeinsamer Speicher
Stab
t-Test
Versionsverwaltung
Internetworking
Intel
Dijkstra-Algorithmus
Geräusch
Dämpfung
Reverse Engineering
Software
Spieltheorie
Prozess <Informatik>
t-Test
Computersicherheit
Skript <Programm>
Optimierung
Hacker
Hardware
Softwaretest
Softwareentwickler
Reverse Engineering
Computersicherheit
Algorithmische Programmiersprache
Office-Paket
Software
Flächeninhalt
COM
Zustand
Mereologie
Kantenfärbung
Ordnung <Mathematik>
Message-Passing
Resultante
Router
Lokales Netz
Chipkarte
Bit
Prozess <Physik>
Punkt
Gewichtete Summe
Gemeinsamer Speicher
Programmverifikation
Versionsverwaltung
Datenmanagement
Computer
Homepage
Eins
Intel
Datenmanagement
Datenverarbeitungssystem
Serielle Schnittstelle
Softwarewerkzeug
Protokoll <Datenverarbeitungssystem>
Computersicherheit
Schnitt <Graphentheorie>
Maschinelles Sehen
Hacker
Schnelltaste
Hardware
Computersicherheit
Verhandlungs-Informationssystem
Speicher <Informatik>
TLS
Ähnlichkeitsgeometrie
Quellcode
Elektronische Unterschrift
Arithmetisches Mittel
Generator <Informatik>
UDP <Protokoll>
Physikalische Theorie
Information
p-Block
Programmierumgebung
Rückkopplung
Server
Kontrollstruktur
Firewall
Automatische Handlungsplanung
Content <Internet>
Sprachsynthese
Dienst <Informatik>
Kombinatorische Gruppentheorie
Nonstandard-Analysis
Systemplattform
Unternehmensarchitektur
Demoszene <Programmierung>
Task
Chiffrierung
Bildschirmmaske
Task
Webforum
Authentifikation
Spieltheorie
Proxy Server
Mikrokernel
Endogene Variable
Datenstruktur
Ereignishorizont
Hardware
Gammafunktion
Autorisierung
Soundverarbeitung
Einfach zusammenhängender Raum
Architektur <Informatik>
Betafunktion
Browser
Paarvergleich
Systemplattform
Quick-Sort
Keller <Informatik>
Inverser Limes
Office-Paket
Videokonferenz
Hypermedia
Mereologie
Hintertür <Informatik>
Unternehmensarchitektur
Term
Verkehrsinformation
Gewichtete Summe
Schreiben <Datenverarbeitung>
Aggregatzustand
Zählen
Raum-Zeit
Richtung
Intel
Speicherabzug
Protokoll <Datenverarbeitungssystem>
Dateiverwaltung
Kontrollstruktur
Emulator
Softwaretest
Addition
Hardware
Datennetz
Computersicherheit
Güte der Anpassung
Mobiles Internet
Strömungsrichtung
Rhombus <Mathematik>
Verbandstheorie
Menge
Forcing
Benutzerschnittstellenverwaltungssystem
Konditionszahl
Server
Ordnung <Mathematik>
Subtraktion
Mathematische Logik
Lochstreifen
Kontrollstruktur
Wasserdampftafel
Mathematisierung
Automatische Handlungsplanung
Whiteboard
Unternehmensarchitektur
Open Source
Pufferspeicher
Bildschirmmaske
Informationsmodellierung
Webforum
Spieltheorie
Mobiles Internet
Diskrepanz
Modul
Gerichtete Menge
Pixel
Verzweigendes Programm
Systemplattform
Schlussregel
Gasströmung
Modul
Chipkarte
Kreisbogen
Whiteboard
Meter
Gamecontroller
Leistung <Physik>
ICC-Gruppe
Bridge <Kommunikationstechnik>
Lokales Netz
Bit
Versionsverwaltung
Computer
Computerunterstütztes Verfahren
Eins
Übergang
Datenmanagement
Vier
Prozess <Informatik>
Druckertreiber
Schnitt <Graphentheorie>
Hacker
Schnelltaste
Lineares Funktional
ATM
Physikalischer Effekt
Statisches RAM
Kardinalzahl
Firmware
p-Block
Programmierumgebung
Algorithmische Programmiersprache
Teilbarkeit
Arithmetisches Mittel
Strahlensätze
Funktion <Mathematik>
Zentraleinheit
Speicherverwaltung
Aggregatzustand
Web Site
Existenzaussage
Quader
Hausdorff-Dimension
Hauptplatine
Kombinatorische Gruppentheorie
ROM <Informatik>
Term
Polarkoordinaten
Symmetrie
Software
Stichprobenumfang
Pay-TV
Passwort
Booten
Strom <Mathematik>
Bildgebendes Verfahren
Schreib-Lese-Kopf
Leistung <Physik>
Schätzwert
Assoziativgesetz
Binärcode
Winkel
Mailing-Liste
Physikalisches System
Objekt <Kategorie>
Mereologie
Speicherabzug
Resultante
Matrizenrechnung
Prozess <Physik>
Punkt
Leistungsbewertung
Natürliche Zahl
Datenmanagement
Binärcode
Analysis
Übergang
Intel
Softwaretest
Font
RPC
Konsistenz <Informatik>
Code
Maskierung <Informatik>
Computersicherheit
Protokoll <Datenverarbeitungssystem>
Rootkit
Schnitt <Graphentheorie>
Einflussgröße
Schnittstelle
Sinusfunktion
Softwaretest
Divergenz <Vektoranalysis>
Parametersystem
ATM
Benutzerfreundlichkeit
Seidel
Reverse Engineering
Computersicherheit
Systemaufruf
Firmware
Quellcode
Frequenz
Rechenschieber
Generator <Informatik>
Chiffrierung
Funktion <Mathematik>
Wurzel <Mathematik>
Rechter Winkel
Server
Speicherverwaltung
Computervirus
Quader
Mathematisierung
ROM <Informatik>
Physikalische Theorie
Code
Quellcode
Open Source
Puffer <Netzplantechnik>
Virtuelle Maschine
Datennetz
Arbeitsplatzcomputer
Idealer Punkt
Booten
Biprodukt
Speicher <Informatik>
Hardware
Soundverarbeitung
Binärcode
Videospiel
Rootkit
Antwortfunktion
Fluktuation <Physik>
Quick-Sort
Flächeninhalt
Makrobefehl
Compiler
Steuerwerk
Kernel <Informatik>
Vektorpotenzial
Momentenproblem
Nabel <Mathematik>
Huffman-Code
Datenmanagement
Diskrete Fourier-Transformation
Extrempunkt
Raum-Zeit
Homepage
Intel
Spezialrechner
Code
Typentheorie
Fahne <Mathematik>
Faktor <Algebra>
Quellencodierung
E-Mail
Gerade
Schnittstelle
Addition
Sichtenkonzept
Datennetz
Kontextbezogenes System
Generator <Informatik>
Garbentheorie
Rechter Winkel
Fehlermeldung
Tabelle <Informatik>
Instantiierung
Partitionsfunktion
Subtraktion
Folge <Mathematik>
Mathematisierung
ROC-Kurve
Homepage
Demoszene <Programmierung>
Quellcode
Informationsmodellierung
Modul <Datentyp>
Datentyp
Skript <Programm>
Datenstruktur
Konfigurationsraum
Modul
Tabelle <Informatik>
Soundverarbeitung
Booten
Raum-Zeit
sinc-Funktion
Modul
Partitionsfunktion
Flash-Speicher
Resultante
Bit
Programmiergerät
Punkt
Texteditor
Gemeinsamer Speicher
Natürliche Zahl
Versionsverwaltung
Komplex <Algebra>
Steuerwerk
Stangenzirkel
Eins
Internetworking
Kernel <Informatik>
Arbeit <Physik>
Einheit <Mathematik>
Gamecontroller
Stellenring
Spieltheorie
Systemaufruf
Nummerung
Firmware
p-Block
Quellcode
Elektronische Unterschrift
Arithmetisches Mittel
Datenstruktur
Funktion <Mathematik>
Programmiergerät
Projektive Ebene
Garbentheorie
Schlüsselverwaltung
Versionsverwaltung
Message-Passing
Codebuch
Filetransferprotokoll
Parametrisierung
Keller <Informatik>
Term
ROM <Informatik>
Code
Physikalische Theorie
Wiederherstellung <Informatik>
Wurm <Informatik>
Physikalisches System
Systemprogrammierung
Elektronische Unterschrift
Torus
Restklasse
Stichprobenumfang
Inverser Limes
COM
Booten
FAQ
Bildgebendes Verfahren
Touchscreen
Hardware
Konfigurationsraum
Mailing-Liste
Physikalisches System
Vektorraum
Fokalpunkt
Quick-Sort
Office-Paket
Fundamentalsatz der Algebra
Mereologie
Speicherabzug
Kernel <Informatik>
Einfügungsdämpfung
Mereologie
Nabel <Mathematik>
Aggregatzustand
Raum-Zeit
Netzwerktopologie
Intel
Metadaten
Spezialrechner
Code
E-Mail
Gerade
Softwaretest
Reverse Engineering
Güte der Anpassung
Strömungsrichtung
Ausnahmebehandlung
Biprodukt
Software
Generator <Informatik>
Zurücksetzung <Transaktion>
Beweistheorie
Fehlermeldung
Partitionsfunktion
Subtraktion
Hash-Algorithmus
Mathematisierung
Kraft
Nummerung
Systemplattform
Informationsmodellierung
Verbindungsloser Server
Verzeichnisdienst
Arithmetische Folge
Modul <Datentyp>
Datennetz
Datentyp
Gruppoid
Maßerweiterung
Datenstruktur
Demo <Programm>
Normalvektor
Modul
Binärdaten
Eindringerkennung
Booten
Systemplattform
Gasströmung
Partitionsfunktion
Modul
Flash-Speicher
Resultante
Bit
Web log
Versionsverwaltung
Kartesische Koordinaten
Internetworking
Kernel <Informatik>
Eins
Einheit <Mathematik>
Bit
Schwebung
Addition
Funktion <Mathematik>
Statisches RAM
Nummerung
Firmware
Vorzeichen <Mathematik>
Quellcode
Elektronische Unterschrift
RSA-Verschlüsselung
Filetransferprotokoll
Funktion <Mathematik>
ATM
Phasenumwandlung
Projektive Ebene
Information
Message-Passing
Aggregatzustand
Gewicht <Mathematik>
Metadaten
Schaltnetz
Gruppenoperation
Implementierung
Keller <Informatik>
Zentraleinheit
Code
Physikalisches System
Message-Passing
Notebook-Computer
Adressraum
Booten
Strom <Mathematik>
Zeiger <Informatik>
Bildgebendes Verfahren
Touchscreen
Leistungsbewertung
Fehlermeldung
Fehlererkennungscode
Diskretes System
Einfache Genauigkeit
Mailing-Liste
Physikalisches System
Singularität <Mathematik>
Fundamentalsatz der Algebra
Last
Mereologie
Notebook-Computer
Vollständigkeit
Verkehrsinformation
SCI <Informatik>
Schlüsselverwaltung
Mereologie
Strömungsrichtung
Diskrete Fourier-Transformation
Message-Passing
Bildgebendes Verfahren
Demo <Programm>
Aggregatzustand
Schreib-Lese-Kopf
Einfügungsdämpfung
Programmiergerät
Bit
Prozess <Physik>
Punkt
Momentenproblem
Computer
Computerunterstütztes Verfahren
Stangenzirkel
Internetworking
Medianwert
Vorzeichen <Mathematik>
Gruppe <Mathematik>
Mustersprache
Metropolitan area network
Bildauflösung
Addition
Hardware
Assembler
Kategorie <Mathematik>
Reverse Engineering
Vorzeichen <Mathematik>
Quellcode
Gruppenoperation
Heimcomputer
Motion Capturing
Rechenschieber
COM
Rechter Winkel
Festspeicher
Information
Wärmeleitfähigkeit
Explosion <Stochastik>
Zurücksetzung <Transaktion>
Mathematisierung
Zahlenbereich
Kombinatorische Gruppentheorie
Term
Whiteboard
Physikalische Theorie
Wiederherstellung <Informatik>
Hypermedia
Systemprogrammierung
Bildschirmmaske
Informationsmodellierung
Kugel
Spieltheorie
Notebook-Computer
Luenberger-Beobachter
Coprozessor
Optimierung
Datenstruktur
Bildgebendes Verfahren
Leistung <Physik>
Relativitätstheorie
Physikalisches System
Vektorraum
Modul
Integral
Flächeninhalt
Mereologie
Gamecontroller
Speicherabzug
Verkehrsinformation

Metadaten

Formale Metadaten

Titel Intel ME: Myths and reality
Serientitel 34th Chaos Communication Congress
Autor Skochinsky, Igor
Corna, Nicola
Lizenz CC-Namensnennung 4.0 International:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34942
Herausgeber Chaos Computer Club e.V.
Erscheinungsjahr 2017
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract Many claims were made recently about purpose and capabilities of the Intel ME but with all the buzz it is not always clear what are facts and what is just speculation. We'll try to clear the fog of misunderstanding with research based on investigations of ME firmware and practical experiments on ME-equipped hardware.
Schlagwörter Security

Zugehöriges Material

Folgende Ressource ist Begleitmaterial zum Video
Video wird in der folgenden Ressource zitiert

Ähnliche Filme

Loading...
Feedback