Mark Ermolov

@_markel___

I'm researching security of Intel's platforms. I'm not working for Intel

Vrijeme pridruživanja: rujan 2014.

Tweetovi

Blokirali ste korisnika/cu @_markel___

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_markel___

  1. Prikvačeni tweet
    27. kol 2018.

    Ready to uncover Intel ME background? Use our PoC to activate JTAG and dump ME ROM

    Poništi
  2. 31. sij

    Accidentally pushed my CSME 12.x rbe module IDA project metadata to Lumina sever. So..., enjoy

    Poništi
  3. proslijedio/la je Tweet
    28. sij

    My patch to disable PCI device DMA in early boot to avoid gaps in IOMMU coverage just got merged to mainline, so here's a writeup of it:

    Poništi
  4. proslijedio/la je Tweet
    Odgovor korisniku/ci

    Not found becaus I wasn’t able to personally review the whole thing 😉 Lots of teams But on FM, yes it would work, the tech is there today The tooling is messy and version1 quality (or worse), but the tech is there

    Poništi
  5. 26. sij

    I don't think FM work for such complex systems as Intel CSME. Starting from Intel-SA-00086 there were found many bugs in CSME firmware. I think in 2012 you were working just on CSME 11.x. Why those trivial buffer overflow bugs were not found?

    Poništi
  6. proslijedio/la je Tweet
    23. sij

    ========================= The Life and Incredible Adventures of One QEMU Bug (Which I Finally Fixed) ========================= A thread [1/n]

    Prikaži ovu nit
    Poništi
  7. 22. sij

    It's what Xiaoyu Ruan (in his Platform Embedded Security Technology Revealed) says about EPID key burned in security fuses

    Poništi
  8. 22. sij

    We've found a bug in CSME on-die ROM!💥 Intel says it's already targeted by CVE-2019-0090 (). Security Fuses can be extracted! 🔥 Mehlow and Cannon Point chipsets are affected. Stay tuned!

    Poništi
  9. 22. sij

    According to latest Intel OpenIPC hw debug toolkit not only upcoming mobile Tiger Lake (and subsequent Alder Lake) processors will support CET but also more near 10th Gen mainstream desktop Comet Lake (see Shadow Stack Pointer new arch register)

    Poništi
  10. proslijedio/la je Tweet
    21. sij

    Untrusted Roots: exploiting vulnerabilities in Intel ACMs by

    Poništi
  11. 20. sij

    Intel attempted to hide the bug behind the less critical PMC vulnerability (INTEL-SA-00131). We will describe the INTEL-SA-00131 also.

    Prikaži ovu nit
    Poništi
  12. 20. sij

    Intel Cannon Point chipset (300 series) as well as Apollo Lake and Gemini Lake SoCs have very dangerous Delayed Authentication Mode (DAM) vulnerability allowing arbitrary code execution and the root key prediction. Detailed write-up is coming. Stay tuned.

    Prikaži ovu nit
    Poništi
  13. 11. sij

    This DSLogic Plus 16-channels logic analyzer is very suitable for Intel VISA external analysis (via GPIOs acting as PTI port). It has additional lines for external clock and trigger signals so it's best for tracing of up-to two VISA lanes

    Poništi
  14. 2. sij
    Poništi
  15. 1. sij

    doesn't prevent... of course.

    Prikaži ovu nit
    Poništi
  16. 1. sij

    It seems that AMD also suffers from a lack of firmware downgrade prevention for their PSP subsystem. They fixed the public key overwrite bug but that actually does nothing: it does prevent to execute arbitrary code on their PSP

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    31. pro 2019.

    Slightly late, but here's the slides to my talk: . Contains some useful bonus slides and links, somewhere in the next few days I will add more references to prior work on this subject.

    Poništi
  18. proslijedio/la je Tweet
    27. pro 2019.

    A lot of great information from ⁦

    Poništi
  19. proslijedio/la je Tweet
    27. pro 2019.

    This should be interesting

    Poništi
  20. proslijedio/la je Tweet
    27. pro 2019.

    The AMD Secure Processor is a CPU in your CPU you do not control. It’s a Trusted Execution Environment to protect VMs from host access or copyrighted work from distribution. At I will present our PSP hacking and how we regained control over it.

    Prikaži ovu nit
    Poništi
  21. 27. pro 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·