Copernicus 2: SENTER the Dragon!

Abstract

Discussion of how a SMM MitM attacker (“Smite’em”) can subvert all software-based BIOS capture utilities (including our own Copernicus). Proposed the use of Intel Trusted Execution Technology (TXT) to improve the trustworthiness of the BIOS capture mechanism due to implicit SMI suppression & capability for remote attestation. (Later it was determine that newer hardware doesn’t suppress SMIs. See “SENTER Sandman”.)

Publication
In CanSecWest 2014

Unfortunately CanSecWest never posted the conference video for this.

Xeno Kovah
Xeno Kovah
Dark Mentor Level X

Hacking firmware like it’s no big deal.