To translate last tweet into English, ARM processors do have microcode in display system you can use to hide a backdoor not in memory
@dragosr @cynicalsecurity you are going to love the SDMA core then
-
-
@AndreaBarisani@cynicalsecurity not sure if "love" is exactly the right word, ;-P but thanks very much for pointing this out. -
@dragosr@cynicalsecurity this component is still safely isolated by TZ btw, despite its capabilities -
@AndreaBarisani got that, tho these kinds of components can still present "challenging" functionality for underlying client OS security -
@dragosr indeed, also it takes literally one bit of incorrect TrustZone configuration to make everything fall apart
End of conversation
New conversation -
-
-
@cynicalsecurity@dragosr independent RISC core for DMA operations, own RAM, instruction set and volatile microcode, still safe under TZ -
@AndreaBarisani@dragosr volatile microcode for? -
@cynicalsecurity@dragosr for its own "scripts" to have custom DMA ops http://billauer.co.il/blog/2011/10/imx-sdma-howto-assembler-linux/ …
End of conversation
New conversation
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.