A Hijacker's Guide to the LPC bus IAIK/EUROPKI2011/HIJACKER'S GUIDE 1

Size: px
Start display at page:

Download "A Hijacker's Guide to the LPC bus IAIK/EUROPKI2011/HIJACKER'S GUIDE 1"

Transcription

1 A Hijacker's Guide to the LPC bus IAIK/EUROPKI2011/HIJACKER'S GUIDE 1

2 Motivation Endpoint security and Trusted Computing How about resilience against simple hardware attacks? IAIK/EUROPKI2011/HIJACKER'S GUIDE 2

3 Trusted Computing in a nutshell Trusted Computing (TCG-style) Trusted Platform Module Passive smart-card like component Stores and reports measurement values Platform Configuration Registers (PCRs) Roots-of-Trust for Measurement Submit measurements to the TPM Construct a chain of measurements IAIK/EUROPKI2011/HIJACKER'S GUIDE 3

4 Chain of Trust (static) Measure before execute Platform Configuration Register are not directly modifiable (the can only be extended) BIOS CRTM TPM PCR 23 Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 4

5 Chain of Trust (static) Measure before execute Platform Configuration Register are not directly modifiable (the can only be extended) BIOS CRTM Boot Loader TPM PCR extend Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 5

6 Chain of Trust (static) Measure before execute Platform Configuration Register are not directly modifiable (the can only be extended) Evil OS Unknown dangers lurk here BIOS CRTM Boot Loader Good OS Safe harbor of trust TPM PCR extend extend Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 6

7 Chain of Trust (static) Measure before execute Platform Configuration Register are not directly modifiable (the can only be extended) Evil OS Unknown dangers lurk here BIOS CRTM Boot Loader Trusted App. Good OS Safe harbor of trust TPM PCR extend extend extend Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 7

8 Late-Launch (D-RTM) From untrusted to trusted Objective: Establish one good measurement and late-launch trusted code To trust or not to trust? App. CPU TPM PCR?? Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 8

9 Late-Launch (D-RTM) Trigger the late launch sequence Trusted microcode inside the CPU takes over control To trust or not to trust? App. CPU Trusted Microcode TPM PCR?? Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 9

10 Late-Launch (D-RTM) Reset special purpose D-RTM PCRs CPU sends a special command to tell the TPM about the late-launch event To trust or not to trust? App. CPU Trusted Microcode TPM PCR?? reset 00 Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 10

11 Late-Launch (D-RTM) Measure and execute trusted code To trust or not to trust? App. Trusted Code CPU Trusted Microcode TPM PCR?? reset extend Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 11

12 Late-Launch (D-RTM) Transition from untrusted to trusted is complete To trust or not to trust? App. Trusted Code Safe harbor of trust CPU Trusted Microcode TPM PCR?? reset extend extend Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 12

13 The desktop PC RAM RAM RAM Memory Hub (Northbridge) Main CPU Keyboard Mouse Flash BIOS Super I/O Controller I/O Hub (Southbridge) Claim: We can't trust the software on this platform. There is no way to tell which software is running. Floppy Drive IAIK/EUROPKI2011/HIJACKER'S GUIDE 13

14 The trusted desktop PC RAM RAM RAM Memory Hub (Northbridge) Main CPU Flash BIOS TPM I/O Hub (Southbridge) Claim: We can trust the platform to tell us reliably which software is running. Keyboard Mouse Floppy Drive Super I/O Controller (It is still up to us if we trust the software itself...) (at least partially) Trusted System Component IAIK/EUROPKI2011/HIJACKER'S GUIDE 14

15 TPM's view of a Late-Launch RAM RAM RAM Memory Hub (Northbridge) Main CPU Microcode TPM I/O Hub (Southbridge) TPM register writes pass through the North- and South-bridges to the LPC bus and the TPM. IAIK/EUROPKI2011/HIJACKER'S GUIDE 15

16 TPM's view of a Late-Launch RAM RAM RAM Memory Hub (Northbridge) Main CPU Microcode TPM I/O Hub (Southbridge) TPM register writes pass through the North- and South-bridges to the LPC bus and the TPM. Low Pin Count (LPC) bus IAIK/EUROPKI2011/HIJACKER'S GUIDE 16

17 TPM's view of the Late Launch Start of Late Launch Sequence (Dummy write to TPM_HASH_START register) I/O Hub (Southbridge) Trusted code is sent to the TPM for measurement (Multiple writes to TPM_HASH_DATA register) TPM CPU signals that the trusted code is being invoked (Dummy write to TPM_HASH_END register) Unencrypted and Unauthenticated LPC Bus Traffic Main CPU Late Launch Microcode IAIK/EUROPKI2011/HIJACKER'S GUIDE 17

18 Local adversaries Dishonest employee Leak/steal protected information... Circumvent software policies... Malicious end-user Defeat Digital Rights Management... Curious researcher (e.g. me) Interested in why things work and how they break... IAIK/EUROPKI2011/HIJACKER'S GUIDE 18

19 What is a simple hardware attack?... What is the definition of a simple hardware attack?... Going to a local electronic store, purchasing twenty dollars worth of parts, putting the parts together and defeating the [ ] protection is a simple hardware attack.... [David Grawrock; Dynamics of a Trusted Platform, Intel Press, 2009, p. 132] IAIK/EUROPKI2011/HIJACKER'S GUIDE 19

20 Why we can't simulate the Late-Launch in software TPM Localities Simple hardware based mechanism to signal origin of a TPM transaction Locality 4 Trusted Hardware (D-RTM) Only usable by the late launch CPU microcode Illegal access attempts are filtered by the Southbridge D-RTM related TPM registers are only accessible by locality 4 IAIK/EUROPKI2011/HIJACKER'S GUIDE 20

21 A sneak peek at the LPC bus Low Pin Count Bus Low-bandwidth devices (Super I/O chip, TPM) Minimal configuration: 7 bus wires 1x Clock, 1x Reset, 1x Start-of-Frame, 4x Address/Data Weakest (hardware) link between CPU and TPM Low clock speed (33 MHz) Few bus lines (= fewer probe wires) No checksums/authentication/encryption IAIK/EUROPKI2011/HIJACKER'S GUIDE 21

22 A sneak peek at the LPC bus Two interesting types of LPC bus cycles Memory write cycle START CTDIR 32-bit Address 8-bit Data TAR SYNC TPM write cycle START CTDIR 16-bit Address 8-bit Data TAR SYNC 4-bit Locality 12-bit Register Defined by the LPC bus specification (At least partially) controlled by the attacker Protected by trusted hardware (Southbridge) IAIK/EUROPKI2011/HIJACKER'S GUIDE 22

23 Memory vs. TPM bus cycles Memory write cycles Easy to generate in software (<50 LOC C program) Get root access on the target machine Comparison memory vs. TPM cycles: Start of Frame Memory write START CTDIR 32-bit Address 8-bit Data TAR SYNC TPM write START CTDIR 16-bit Address 8-bit Data TAR SYNC Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 23

24 A time-shift experiment Assume that we have two independent cycles One Memory cycle starting at time zero One TPM cycle starting a little bit later Start of Frame Memory write START CTDIR 32-bit Address 8-bit Data TAR SYNC Start of Frame TPM write START CTDIR 16-bit Address 8-bit Data TAR SYNC Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 24

25 Hijacking the memory cycle We can hijack a memory cycle... and piggy-back an arbitrary TPM cycle. We feed the TPM with a modified frame signal Hardware filter in the Southbridge does not detect us Attacker-created delay Start of Frame (Southbridge) Memory write START CTDIR 32-bit Address 8-bit Data TAR SYNC Start of Frame (to TPM) TPM write Locality is under full control of the attacker START CTDIR 16-bit Address 8-bit Data TAR SYNC Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 25

26 Hijacking the bus in theory... RAM RAM RAM Memory Hub (Northbridge) Main CPU TPM Multiplexed Address/Data Lines Original frame signal I/O Hub (Southbridge) Minimal hardware modifications Tap the address/data lines (two are strictly required) Break the original frame signal path anywhere along its way to the TPM Hijacker Device IAIK/EUROPKI2011/HIJACKER'S GUIDE 26

27 and in practice! (Lab setup) PC Southbridge Simulator TPM v1.2 daugtherboard LPC bus hijacking device IAIK/EUROPKI2011/HIJACKER'S GUIDE 27

28 and potential victim platforms AMD processor with TPM on a daughter-board Intel processor with fixed TPM (not shown here) IAIK/EUROPKI2011/HIJACKER'S GUIDE 28

29 LPC bus probing experiment Dead Bug probe wires on top of a flash memory chip Work time: ~45 min Disassemble Solder probes Install evil hardware Reassemble Investigates feasibility of bus probing approach IAIK/EUROPKI2011/HIJACKER'S GUIDE 29

30 testing the hijacker device Test setup on an old development board with TPM daughter-board. Work time: ~15 min Disassemble Install T-adapter Install hijacker Reassemble In-system operation of the hijacker IAIK/EUROPKI2011/HIJACKER'S GUIDE 30

31 Impact Simulated late launch ( Untrusted to untrusted ) TPM's view of the platform state got corrupted To trust or not to trust? Evil App HIC SUNT DRAGONES Hijacker Device LPC bus modification PCRs no longer reflect the actual platform state... TPM PCR?? reset extend Time IAIK/EUROPKI2011/HIJACKER'S GUIDE 31

32 Impact Construction of fake measurement values Static RTM (via TPM reset attack ) Described independently by Kauer and Sparks Use LPC bus hijacking to simulate a D-RTM Introduced in our paper There is currently no simple way for a verifier to distinguish fake measurements constructed in this manner from real measurements done on the same TPM. IAIK/EUROPKI2011/HIJACKER'S GUIDE 32

33 Lessons learned Attack resilience of trusted PC platforms TPM is hard target CPU and microcode are hard targets Trusted PC platforms are (still) weak targets for attackers with physical access Never trust a remote endpoint even if it has a TPM IAIK/EUROPKI2011/HIJACKER'S GUIDE 33

34 IAIK/EUROPKI2011/HIJACKER'S GUIDE 34

35 Bill of materials Testing equipment (hardware) ~15 TPM daughter-board (from Amazon) ~450 Spartan-3A DSP 1800 board (used as South-bridge simulator, from Avnet) Attack equipment (hardware) ~10 Breadboards, wires, resistors, etc. ~70 Spartan-3E 100 board (used as hijacker device, from Avnet) Software 0 GNU VHDL simulator (GHDL) 0 Xilinx ISE WebPack software (and Xilinx EDK evaluation license) IAIK/EUROPKI2011/HIJACKER'S GUIDE 35

36 Acknowledgements The FP7 SEPIA project is co-financed by the EC under the contract number If you need further information, please visit our website IAIK/EUROPKI2011/HIJACKER'S GUIDE 36

A Smart Port Card Tutorial --- Hardware

A Smart Port Card Tutorial --- Hardware A Smart Port Card Tutorial --- Hardware John DeHart Washington University jdd@arl.wustl.edu http://www.arl.wustl.edu/~jdd 1 References: New Links from Kits References Page Intel Embedded Module: Data Sheet

More information

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module 1 Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2016/17 Roadmap: TPM

More information

OVAL + The Trusted Platform Module

OVAL + The Trusted Platform Module OVAL + The Trusted Platform Module Charles Schmidt June 14, 2010 Overview OVAL Can assess a vast diversity of system state Usually software based software attacks can compromise Trusted Platform Module

More information

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module 1 Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2017/18 Roadmap: TPM

More information

BIOS. Chapter The McGraw-Hill Companies, Inc. All rights reserved. Mike Meyers CompTIA A+ Guide to Managing and Troubleshooting PCs

BIOS. Chapter The McGraw-Hill Companies, Inc. All rights reserved. Mike Meyers CompTIA A+ Guide to Managing and Troubleshooting PCs BIOS Chapter 8 Overview In this chapter, you will learn how to Explain the function of BIOS Distinguish among various CMOS setup utility options Describe option ROM and device drivers Troubleshoot the

More information

Lecture Embedded System Security Trusted Platform Module

Lecture Embedded System Security Trusted Platform Module 1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2015 Roadmap: TPM Introduction to TPM TPM architecture

More information

I Don't Want to Sleep Tonight:

I Don't Want to Sleep Tonight: I Don't Want to Sleep Tonight: Subverting Intel TXT with S3 Sleep Seunghun Han, Jun-Hyeok Park (hanseunghun parkparkqw)@nsr.re.kr Wook Shin, Junghwan Kang, HyoungChun Kim (wshin ultract khche)@nsr.re.kr

More information

Past, Present, and Future Justin Johnson Senior Principal Firmware Engineer

Past, Present, and Future Justin Johnson Senior Principal Firmware Engineer Dell Firmware Security Past, Present, and Future Justin Johnson Senior Principal Firmware Engineer justin.johnson1@dell.com Dell Security 2 What does BIOS do? Configure and Test System Memory Configure

More information

Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006)

Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Trusted Computing Hardware What can you do if you have

More information

CIS 4360 Secure Computer Systems Secured System Boot

CIS 4360 Secure Computer Systems Secured System Boot CIS 4360 Secure Computer Systems Secured System Boot Professor Qiang Zeng Spring 2017 Previous Class Attacks against System Boot Bootkit Evil Maid Attack Bios-kit Attacks against RAM DMA Attack Cold Boot

More information

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs

More information

FUNCTIONS OF COMPONENTS OF A PERSONAL COMPUTER

FUNCTIONS OF COMPONENTS OF A PERSONAL COMPUTER FUNCTIONS OF COMPONENTS OF A PERSONAL COMPUTER Components of a personal computer - Summary Computer Case aluminium casing to store all components. Motherboard Central Processor Unit (CPU) Power supply

More information

How to create a trust anchor with coreboot.

How to create a trust anchor with coreboot. How to create a trust anchor with coreboot. Trusted Computing vs Authenticated Code Modules Philipp Deppenwiese About myself Member of a hackerspace in germany. 10 years of experience in it-security. Did

More information

Flicker: An Execution Infrastructure for TCB Minimization

Flicker: An Execution Infrastructure for TCB Minimization Flicker: An Execution Infrastructure for TCB Minimization Jonathan McCune, Bryan Parno, Adrian Perrig, Michael Reiter, and Hiroshi Isozaki (EuroSys 08) Presented by: Tianyuan Liu Oct 31, 2017 Outline Motivation

More information

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs

More information

Intel s s Security Vision for Xen

Intel s s Security Vision for Xen Intel s s Security Vision for Xen Carlos Rozas Intel Corporation Xen Summit April 7-8, 7 2005 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. EXCEPT AS PROVIDED IN INTEL'S TERMS

More information

Lecture Embedded System Security Introduction to Trusted Computing

Lecture Embedded System Security Introduction to Trusted Computing 1 Lecture Embedded System Security Introduction to Trusted Computing Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Summer Term 2017 Roadmap: Trusted Computing Motivation

More information

Chapter 2 Motherboards and Processors

Chapter 2 Motherboards and Processors A+ Certification Guide Chapter 2 Motherboards and Processors Chapter 2 Objectives Students should be able to explain: Motherboards and Their Components: Form factors, integrated ports and interfaces, memory

More information

TRUSTED COMPUTING TRUSTED COMPUTING. Overview. Why trusted computing?

TRUSTED COMPUTING TRUSTED COMPUTING. Overview. Why trusted computing? Overview TRUSTED COMPUTING Why trusted computing? Intuitive model of trusted computing Hardware versus software Root-of-trust concept Secure boot Trusted Platforms using hardware features Description of

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 4 All About Motherboards

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 4 All About Motherboards Chapter 4 All About Motherboards Objectives Learn about the different types and features of motherboards Learn how to use setup BIOS and physical jumpers to configure a motherboard Learn how to maintain

More information

SGX Security Background. Masab Ahmad Department of Electrical and Computer Engineering University of Connecticut

SGX Security Background. Masab Ahmad Department of Electrical and Computer Engineering University of Connecticut SGX Security Background Masab Ahmad masab.ahmad@uconn.edu Department of Electrical and Computer Engineering University of Connecticut 1 Security Background Outline Cryptographic Primitives Cryptographic

More information

TUX : Trust Update on Linux Kernel

TUX : Trust Update on Linux Kernel TUX : Trust Update on Linux Kernel Suhho Lee Mobile OS Lab, Dankook university suhho1993@gmail.com -- Hyunik Kim, and Seehwan Yoo {eternity13, seehwan.yoo}@dankook.ac.kr Index Intro Background Threat Model

More information

INFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD

INFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD Faculty of Computer Science Institute of Systems Architecture, Operating Systems Group INFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD OVERVIEW Fundamental

More information

Artisan Technology Group is your source for quality new and certified-used/pre-owned equipment

Artisan Technology Group is your source for quality new and certified-used/pre-owned equipment Artisan Technology Group is your source for quality new and certified-used/pre-owned equipment FAST SHIPPING AND DELIVERY TENS OF THOUSANDS OF IN-STOCK ITEMS EQUIPMENT DEMOS HUNDREDS OF MANUFACTURERS SUPPORTED

More information

Xbox Security. Daniel Butnaru. 28 th June 2006

Xbox Security. Daniel Butnaru. 28 th June 2006 Xbox Security Daniel Butnaru 28 th June 2006 Overview Intro Benefits Security System Attacks Conclusion 2 Hardware Introduction XBOX is a game console introduced by Microsoft in 2002. Consists of: Pentium

More information

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector Advanced Threat Defense Certification Testing Report Trend Micro Deep Discovery Inspector ICSA Labs Advanced Threat Defense July 12, 2016 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,

More information

Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2007

Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2007 Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Hermann Härtig Technische Universität Dresden Summer Semester 2007 Goals Understand: authenticated booting the difference

More information

Intelligent Terminal System Based on Trusted Platform Module

Intelligent Terminal System Based on Trusted Platform Module American Journal of Mobile Systems, Applications and Services Vol. 4, No. 3, 2018, pp. 13-18 http://www.aiscience.org/journal/ajmsas ISSN: 2471-7282 (Print); ISSN: 2471-7290 (Online) Intelligent Terminal

More information

Lab 1 CST8214 Ian! D. Allen Winter 2008

Lab 1 CST8214 Ian! D. Allen Winter 2008 CST 8214 Lab #1 Name: Date: Lab Section: Lab partner s name: Lab PC Number: Lab instructor signature (when complete): Objectives: To identify the different hardware components that make up a computer system

More information

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing IoT Week 2014, 2014 06 17 Ignacio García Wellness Telecom Outline Welcome Motivation Objectives TRESCCA client platform SW framework for

More information

The Washington University Smart Port Card

The Washington University Smart Port Card The Washington University Smart Port Card John DeHart Washington University jdd@arl.wustl.edu http://www.arl.wustl.edu/~jdd 1 SPC Personnel Dave Richard - Overall Hardware Design Dave Taylor - System FPGA

More information

Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing

Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing 30/05/11 Goals Understand principles of: Authenticated booting The difference to (closed) secure

More information

Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing

Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing 02/06/14 Goals Understand principles of: Authenticated booting, diference to (closed) secure

More information

USB Framework, IP Core and related software Tropea S.E., Melo R.A.

USB Framework, IP Core and related software Tropea S.E., Melo R.A. USB Framework, IP Core and related software Tropea S.E., Melo R.A. Why? We develop embedded systems that usually connect to a PC. Parallel and serial ports obsolete in favor of USB. Faster Plug & play

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 4 Part II All About Motherboards

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 4 Part II All About Motherboards Chapter 4 Part II All About Motherboards Part 2 Buses and Expansion Slots Bus System of pathways used for communication Carried by bus: Power, control signals, memory addresses, data Data and instructions

More information

Programmed I/O accesses: a threat to Virtual Machine Monitors?

Programmed I/O accesses: a threat to Virtual Machine Monitors? Programmed I/O accesses: a threat to Virtual Machine Monitors? Loïc Duflot & Laurent Absil Central Department for Information Systems Security SGDN/DCSSI 51 boulevard de la Tour Maubourg 75007 Paris Introduction

More information

Dual Port SRAM Based Microcontroller Chip Test Report

Dual Port SRAM Based Microcontroller Chip Test Report Dual Port SRAM Based Microcontroller Chip Test Report By Sergey Kononov, et al. Chip Description Fig. 1: Chip Layout, Pin Configuration The Chip consists of 3 main components: Dual Port SRAM (DPRAM), test

More information

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 WHAT WE DO What we do Robust and Efficient Cryptographic Protocols Research in Cryptography and

More information

Analysis of a Measured Launch

Analysis of a Measured Launch Analysis of a Measured Launch Jon Millen, Joshua Guttman, John Ramsdell, Justin Sheehy, Brian Sniffen The MITRE Corporation Bedford, MA June 5, 2007 Abstract The design of a trusted system based on the

More information

This presentation of uclinux-on-microblaze given

This presentation of uclinux-on-microblaze given This presentation of uclinux-on-microblaze given By: David Banas, Xilinx FAE Nu Horizons Electronics Corp. 2070 Ringwood Ave. San Jose, CA 95131 At: Xilinx Learning Center, San

More information

ROTE: Rollback Protection for Trusted Execution

ROTE: Rollback Protection for Trusted Execution ROTE: Rollback Protection for Trusted Execution Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun Siniša Matetić ETH Zurich Institute of

More information

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs

More information

EE108B Lecture 17 I/O Buses and Interfacing to CPU. Christos Kozyrakis Stanford University

EE108B Lecture 17 I/O Buses and Interfacing to CPU. Christos Kozyrakis Stanford University EE108B Lecture 17 I/O Buses and Interfacing to CPU Christos Kozyrakis Stanford University http://eeclass.stanford.edu/ee108b 1 Announcements Remaining deliverables PA2.2. today HW4 on 3/13 Lab4 on 3/19

More information

Application Note: AN0103. On-Board SPI programming with DediProg tools: Designer version

Application Note: AN0103. On-Board SPI programming with DediProg tools: Designer version 4F., No.7, Ln. 143, Xinming Rd., Neihu Dist., Taipei City 114, Taiwan Application Note: AN0103 On-Board SPI programming with DediProg tools: Designer version DediProg Page 1/25 December 09 Table of content:

More information

Motherboard Specifications, A8AE-LE (AmberineM)

Motherboard Specifications, A8AE-LE (AmberineM) 1 of 7 6/28/2009 11:14 PM» Return to original page Motherboard Specifications, A8AE-LE (AmberineM) Motherboard specifications table Motherboard layout and photos Clearing the CMOS settings Clearing the

More information

Scalable Architectural Support for Trusted Software

Scalable Architectural Support for Trusted Software Scalable Architectural Support for Trusted Software David Champagne and Ruby B. Lee Princeton University Secure Processor Design 11/02/2017 Dimitrios Skarlatos Motivation Apps handle sensitive/secret information

More information

Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2009

Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2009 Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Hermann Härtig Technische Universität Dresden Summer Semester 2009 Goals Understand principles of: authenticated booting the

More information

2-megabit Firmware Hub and Low-Pin Count Flash Memory AT49LH002. Features. Description. Pin Configurations

2-megabit Firmware Hub and Low-Pin Count Flash Memory AT49LH002. Features. Description. Pin Configurations Features Complies with Intel Low-Pin Count (LPC) Interface Specification Revision 1.1 Supports both Firmware Hub (FWH) and LPC Memory Read and Write Cycles Auto-detection of FWH and LPC Memory Cycles Can

More information

Interconnecting Components

Interconnecting Components Interconnecting Components Need interconnections between CPU, memory, controllers Bus: shared communication channel Parallel set of wires for data and synchronization of data transfer Can become a bottleneck

More information

Computer Maintenance. PC Disassembly and Reassembly. Copyright Texas Education Agency, All rights reserved.

Computer Maintenance. PC Disassembly and Reassembly. Copyright Texas Education Agency, All rights reserved. Computer Maintenance PC Disassembly and Reassembly 1 Enabling Objectives Computer Chassis (Cases) Power Supplies Configuring the Motherboard Configuring the Connectors CPU Interfaces RAM Installing a Hard

More information

Computer Architecture

Computer Architecture Computer Architecture PCI and PCI Express 2018. február 22. Budapest Gábor Horváth associate professor BUTE Dept. of Networked Systems and Services ghorvath@hit.bme.hu 2 The PCI standard PCI = Peripheral

More information

Computer Maintenance. Unit Subtitle: Motherboards. Copyright Texas Education Agency, All rights reserved. 1

Computer Maintenance. Unit Subtitle: Motherboards. Copyright Texas Education Agency, All rights reserved. 1 Computer Maintenance Unit Subtitle: Motherboards 1 Lesson Objectives Describe the function of the motherboard. Identify the different types of motherboards and their characteristics. Identify the main

More information

Recommendations for TEEP Support of Intel SGX Technology

Recommendations for TEEP Support of Intel SGX Technology Recommendations for TEEP Support of Intel SGX Technology Overview of SGX & Selected TEEP Topics David M. Wheeler david.m.wheeler@intel.com 1 Apologies If you are really interested in the details of SGX

More information

Providing Fundamental ICT Skills for Syrian Refugees PFISR

Providing Fundamental ICT Skills for Syrian Refugees PFISR Yarmouk University Providing Fundamental ICT Skills for Syrian Refugees (PFISR) Providing Fundamental ICT Skills for Syrian Refugees PFISR Dr. Amin Jarrah Amin.jarrah@yu.edu.jo Objectives Covered 1.1 Given

More information

RiceNIC. Prototyping Network Interfaces. Jeffrey Shafer Scott Rixner

RiceNIC. Prototyping Network Interfaces. Jeffrey Shafer Scott Rixner RiceNIC Prototyping Network Interfaces Jeffrey Shafer Scott Rixner RiceNIC Overview Gigabit Ethernet Network Interface Card RiceNIC - Prototyping Network Interfaces 2 RiceNIC Overview Reconfigurable and

More information

SOM Qseven Spec. System On Module. USER Manual V1.0

SOM Qseven Spec. System On Module. USER Manual V1.0 SOM-6670 Qseven Spec. System On Module USER Manual V1.0 Content Chapter 1 Product Introduction... 1 1.1 Overview... 1 1.2 Motherboard Specification... 1 1.3 Dimension Diagram... 2 Chapter 2 BIOS Setup...

More information

Programmable Logic Design I

Programmable Logic Design I Programmable Logic Design I Introduction In labs 11 and 12 you built simple logic circuits on breadboards using TTL logic circuits on 7400 series chips. This process is simple and easy for small circuits.

More information

Pharmacy college.. Assist.Prof. Dr. Abdullah A. Abdullah

Pharmacy college.. Assist.Prof. Dr. Abdullah A. Abdullah The kinds of memory:- 1. RAM(Random Access Memory):- The main memory in the computer, it s the location where data and programs are stored (temporally). RAM is volatile means that the data is only there

More information

Trusted Network Connect (TNC) 3rd European Trusted Infrastructure Summer School September 2008

Trusted Network Connect (TNC) 3rd European Trusted Infrastructure Summer School September 2008 Trusted Network Connect (TNC) 3rd European Trusted Infrastructure Summer School September 2008 Josef von Helden University of Applied Sciences and Arts, Hanover josef.vonhelden@fh-hannover.de Ingo Bente

More information

RTD cpumodule LX-Series Migration Guide

RTD cpumodule LX-Series Migration Guide RTD cpumodule LX-Series Migration Guide ISO9001 and AS9100 Certified SWM-640000023 Rev. D Page 1 of 9 Revision History Rev. A 02/29/2007 Preliminary Draft Rev. B 06/23/2008 Added information about the

More information

Overview. Wait, which firmware? Threats Update methods request_firmware() hooking Regression testing Future work

Overview. Wait, which firmware? Threats Update methods request_firmware() hooking Regression testing Future work http://outflux.net/slides/2014/lss/firmware.pdf Linux Security Summit, Chicago 2014 Kees Cook (pronounced Case ) Overview Wait, which firmware? Threats Update methods request_firmware()

More information

Assembling Computers Summer Academy Presented by the Petters Research Institute (PRI) in cooperation with the Belize Defense Force

Assembling Computers Summer Academy Presented by the Petters Research Institute (PRI) in cooperation with the Belize Defense Force Assembling Computers 2007 Summer Academy Presented by the Petters Research Institute (PRI) in cooperation with the Belize Defense Force Andrew Schretter Paola Zamora What Will You Learn? What is a computer?

More information

Experiment #0. PC Hardware and Operating Systems

Experiment #0. PC Hardware and Operating Systems Experiment #0 PC Hardware and Operating Systems Objective: The objective of this experiment is to introduce the operating systems and different hardware components of a microcomputer. Equipment: Microcomputer

More information

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.

More information

EE 122: Network Security

EE 122: Network Security Motivation EE 122: Network Security Kevin Lai December 2, 2002 Internet currently used for important services - financial transactions, medical records Could be used in the future for critical services

More information

CIS Operating Systems I/O Systems & Secondary Storage. Professor Qiang Zeng Fall 2017

CIS Operating Systems I/O Systems & Secondary Storage. Professor Qiang Zeng Fall 2017 CIS 5512 - Operating Systems I/O Systems & Secondary Storage Professor Qiang Zeng Fall 2017 Previous class Memory subsystem How to allocate physical memory? How to do address translation? How to be quick?

More information

HARDWARE SECURITY. EEC 492/592, CIS 493 Hands-on Experience on Computer System Security Chan Yu Cleveland State University

HARDWARE SECURITY. EEC 492/592, CIS 493 Hands-on Experience on Computer System Security Chan Yu Cleveland State University HARDWARE SECURITY EEC 492/592, CIS 493 Hands-on Experience on Computer System Security Chan Yu Cleveland State University CONTENTS Overview of Hardware security Basics FPGA (Field Programmable Gate Array)

More information

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Quiz II

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Quiz II Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.858 Fall 2011 Quiz II You have 80 minutes to answer the questions in this quiz. In order to receive credit

More information

DESKTOP MOTHERBOARD SERVICE TRAINING

DESKTOP MOTHERBOARD SERVICE TRAINING DESKTOP MOTHERBOARD SERVICE TRAINING Duration 30 days Course Type Regular / Fast Track / Weekend Timing Regular : 1.00 Hrs Fast Track : 2.00 Hrs Weekend : 4.00 Hrs We Provide Common: Course Materials Troubleshooting/Installation

More information

Lab 6: Intro to FPGAs

Lab 6: Intro to FPGAs Lab 6: Intro to FPGAs UC Davis Physics 116B Rev 2/22/2018 There s a saying when dealing with complex electronic systems: If you can make the LED blink, you re 90% of the way there., so in this lab you

More information

Using the UEFI Shell. October 2010 UEFI Taipei Plugfest Insyde Software

Using the UEFI Shell. October 2010 UEFI Taipei Plugfest Insyde Software Using the UEFI Shell October 2010 UEFI Taipei Plugfest 1 San Francisco Cable Car 2 Agenda Insyde UEFI Support UEFI Shell 2.0 What is it? UEFI Shell 2.0 Unique Features Network Browsing Example Application

More information

Chapter 6 Cubix SP1 Blade Server

Chapter 6 Cubix SP1 Blade Server Chapter 6 Cubix SP1 Blade Server Introduction Cubix designed the SP1 Blade Server to fit inside a BladePoint or BladeStation enclosure. The Blade Server features the Intel Pentium 4 processor, the Intel

More information

Steve Lincoln-Smith Managing Director

Steve Lincoln-Smith Managing Director Steve Lincoln-Smith Managing Director AES Melbourne Steve Lincoln-Smith Managing Director USB USB-3 Thunderbolt Firewire The Question Is it better to buy an audio interface that connects to my computer

More information

Introduction to the Personal Computer

Introduction to the Personal Computer Introduction to the Personal Computer 2.1 Describe a computer system A computer system consists of hardware and software components. Hardware is the physical equipment such as the case, storage drives,

More information

FPGA Development Board For Applications in Cosmic Rays Physics

FPGA Development Board For Applications in Cosmic Rays Physics Faculty of Mathematics & Natural Science FMNS 2013 FPGA Development Board For Applications in Cosmic Rays Physics Ivo Angelov 1, Svetla Dimitrova 2, Krasimir Damov 1 1 - South West University Neofit Rilski

More information

XE 900: Fastest EPIC board now available with Windows XPe

XE 900: Fastest EPIC board now available with Windows XPe XE 900: Fastest EPIC board now available with Windows XPe The XE 900 SBC is a high performance, low power, x86 workhorse for embedded applications. It is an EPIC form factor SBC with a rich family of I/O

More information

Spartan-6 LX9 MicroBoard Embedded Tutorial. Tutorial 5 Embedded Chipscope Debugging

Spartan-6 LX9 MicroBoard Embedded Tutorial. Tutorial 5 Embedded Chipscope Debugging Spartan-6 LX9 MicroBoard Embedded Tutorial Tutorial 5 Embedded Chipscope Debugging Version 13.1.01 Revision History Version Description Date 13.1.01 Initial release for EDK 13.1 5/17/2011 Table of Contents

More information

Motherboard Components of a Desktop Computer

Motherboard Components of a Desktop Computer Motherboard Components of a Desktop Computer The motherboard is the main component inside the case. It is a large rectangular board with integrated circuitry that connects the rest of the parts of the

More information

Assignment 5. You can configure hardware options by setting jumper on the mainboard. See Figure 2-1 for jumper locations. Set a jumper as follows:

Assignment 5. You can configure hardware options by setting jumper on the mainboard. See Figure 2-1 for jumper locations. Set a jumper as follows: CIS 170 Microcomputer Hardware Name: Assignment 5 From the lack of having enough peripherals for this course (at least at this point), we have the necessity of doing some experiments mentally rather than

More information

Sandboxing Untrusted Code: Software-Based Fault Isolation (SFI)

Sandboxing Untrusted Code: Software-Based Fault Isolation (SFI) Sandboxing Untrusted Code: Software-Based Fault Isolation (SFI) Brad Karp UCL Computer Science CS GZ03 / M030 9 th December 2011 Motivation: Vulnerabilities in C Seen dangers of vulnerabilities: injection

More information

Trusted Mobile Keyboard Controller Architecture

Trusted Mobile Keyboard Controller Architecture Trusted Mobile Keyboard Controller Architecture Sundeep Bajikar Security Architect Mobile Platforms Group Intel Corporation September 17, 2003 1 Safer Computing Track Fall IDF Tuesday Wednesday Thursday

More information

GSE/Belux Enterprise Systems Security Meeting

GSE/Belux Enterprise Systems Security Meeting MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 1 In the news Microsoft Exposes Scope of Botnet Threat By Tony Bradley, October 15, 2010 Microsoft's

More information

Trusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept TCG Track: SEC 502 1

Trusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept TCG Track: SEC 502 1 Trusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept 2005 TCG Track: SEC 502 1 The Need for Trusted Computing 2 The Real World Innovation is needed: Client software

More information

Programmable Logic Design I

Programmable Logic Design I Programmable Logic Design I Read through each section completely before starting so that you have the benefit of all the directions. Put on a grounded wrist strap (cf. Getting Started) before touching

More information

TPM v.s. Embedded Board. James Y

TPM v.s. Embedded Board. James Y TPM v.s. Embedded Board James Y What Is A Trusted Platform Module? (TPM 1.2) TPM 1.2 on the Enano-8523 that: How Safe is your INFORMATION? Protects secrets from attackers Performs cryptographic functions

More information

4-megabit Top Boot, Bottom Partitioned Firmware Hub and Low-Pin Count Flash Memory AT49LH00B4

4-megabit Top Boot, Bottom Partitioned Firmware Hub and Low-Pin Count Flash Memory AT49LH00B4 Features Complies with Intel Low-Pin Count (LPC) Interface Specification Revision 1.1 Supports both Firmware Hub (FWH) and LPC Memory Read and Write Cycles Auto-detection of FWH and LPC Memory Cycles Can

More information

Motherboard Central Processing Unit (CPU) Random access memory (RAM)

Motherboard Central Processing Unit (CPU) Random access memory (RAM) Cool Careers in Cyber Security Missing Computer Parts Delivery: Can be used as a table demo (hands-on) activity or during a presentation session. Large display table recommended. Pre-cut and laminate the

More information

Lecture Embedded System Security Introduction to Trusted Computing

Lecture Embedded System Security Introduction to Trusted Computing 1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2015 Roadmap: Trusted Computing Motivation Notion of trust

More information

Creating PCI Express Links in Intel FPGAs

Creating PCI Express Links in Intel FPGAs Creating PCI Express Links in Intel FPGAs Course Description This course provides all necessary theoretical and practical know how to create PCI Express links in Intel FPGAs. The course goes into great

More information

Vivado Design Suite Tutorial. Designing IP Subsystems Using IP Integrator

Vivado Design Suite Tutorial. Designing IP Subsystems Using IP Integrator Vivado Design Suite Tutorial Designing IP Subsystems Using IP Integrator Notice of Disclaimer The information disclosed to you hereunder (the "Materials") is provided solely for the selection and use of

More information

Carmel (MAXREFDES18#) LX9 MicroBoard Quick Start Guide

Carmel (MAXREFDES18#) LX9 MicroBoard Quick Start Guide Carmel (MAXREFDES18#) LX9 MicroBoard Quick Start Guide Rev 0; 8/13 Maxim Integrated cannot assume responsibility for use of any circuitry other than circuitry entirely embodied in a Maxim Integrated product.

More information

Introduction to Security and User Authentication

Introduction to Security and User Authentication Introduction to Security and User Authentication Brad Karp UCL Computer Science CS GZ03 / M030 14 th November 2016 Topics We ll Cover User login authentication (local and remote) Cryptographic primitives,

More information

EVT/WOTE 09 AUGUST 10, Ersin Öksüzoğlu Dan S. Wallach

EVT/WOTE 09 AUGUST 10, Ersin Öksüzoğlu Dan S. Wallach EVT/WOTE 09 AUGUST 10, 2009 Ersin Öksüzoğlu Dan S. Wallach VoteBox Full featured DRE voting machine Paper in USENIX Security Symposium 2008 2 Pre-rendered user interface simplifies the graphics subsystem

More information

v02.54 (C) Copyright , American Megatrends, Inc.

v02.54 (C) Copyright , American Megatrends, Inc. 1 BIOS SETUP UTILITY Main OC Tweaker Advanced H/W Monitor Boot Security Exit System Overview System Time [ 17:00:09] System Date [Wed 11/14/2012] BIOS Version : 960GM-VGS3 FX P1.00 Processor Type : AMD

More information

Spartan-6 LX9 MicroBoard Embedded Tutorial. Lab 6 Creating a MicroBlaze SPI Flash Bootloader

Spartan-6 LX9 MicroBoard Embedded Tutorial. Lab 6 Creating a MicroBlaze SPI Flash Bootloader Spartan-6 LX9 MicroBoard Embedded Tutorial Lab 6 Creating a MicroBlaze SPI Flash Bootloader Version 13.1.01 Revision History Version Description Date 13.1.01 Initial release for EDK 13.1 5/17/11 Table

More information

Embedded Systems Programming

Embedded Systems Programming Embedded Systems Programming x86 System Architecture and PCI Bus (Module 9) Yann-Hang Lee Arizona State University yhlee@asu.edu (480) 727-7507 Summer 2014 Interrupt in 8086 Two pins: NMI and INTR Interrupt

More information

Introduction to Configuration. Chapter 4

Introduction to Configuration. Chapter 4 Introduction to Configuration Chapter 4 This presentation covers: > Qualities of a Good Technician > Configuration Overview > Motherboard Battery > Hardware Configuration Overview > Troubleshooting Configurations

More information

4-megabit Firmware Hub and Low-Pin Count Flash Memory AT49LH004. Not Recommended for New Design

4-megabit Firmware Hub and Low-Pin Count Flash Memory AT49LH004. Not Recommended for New Design Features Complies with Intel Low-Pin Count (LPC) Interface Specification Revision 1.1 Supports both Firmware Hub (FWH) and LPC Memory Read and Write Cycles Auto-detection of FWH and LPC Memory Cycles Can

More information

VMICPCI-7753 Intel Celeron /Pentium III CompactPCI System Controller

VMICPCI-7753 Intel Celeron /Pentium III CompactPCI System Controller Intel Celeron /Pentium III System Controller Single slot system controller, Celeron and Pentium III socket 370 processor-based single board computer (SBC) Up to 192 Mbyte IDE CompactFlash (optional) Four

More information

TCG D-RTM Architecture. Document Version June 17, Contact: Published. Copyright TCG TCG

TCG D-RTM Architecture. Document Version June 17, Contact: Published. Copyright TCG TCG TCG D-RTM Architecture Document Version 1.0.0 June 17, 2013 Contact: admin@trustedcomputinggroup.org Published Copyright TCG 2007-2013 TCG Disclaimers THE COPYRIGHT LICENSES SET FORTH DOES NOT REPRESENT

More information