View Single Post
  #7   (View Single Post)  
Old 23rd August 2014
e1-531g e1-531g is offline
VPN Cryptographer
Join Date: Mar 2014
Posts: 457

I recomend to spend some time on reading this blog:
For example http://theinvisiblethings.blogspot.c...09-slides.html
So, the "Ring -3 Rootkit" presentation is about vPro/AMT chipset compromises.

Unfortunately currently BIOS/UEFI and other forms of firmware example AMT:
1. Are vulnerable to attacks
2. Do a lot of things
3. Have high privileges

This is issue in PC world. Now this could be also in ARMv8 microservers world, because new (not yet published) specification is going to include mandatory ACPI and UEFI, instead of todays simple firmware with device trees. (Yes, these simple firmwares are buggy too and properietary, but there can be written simple, secure open code instead).

Last edited by e1-531g; 23rd August 2014 at 09:55 PM. Reason: Added valuable text
Reply With Quote