Discussion of how a SMM MitM attacker (“Smite’em”) can subvert all software-based BIOS capture utilities (including our own Copernicus). Proposed the use of Intel Trusted Execution Technology (TXT) to improve the trustworthiness of the BIOS capture mechanism due to implicit SMI suppression & capability for remote attestation. (Later it was determine that newer hardware doesn’t suppress SMIs. See “SENTER Sandman”.)
Unfortunately CanSecWest never posted the conference video for this.