Version 1.7 a new dawn
lecture: AMD x86 SMU firmware analysis
Do you care about Matroshka processors?
You definitely should care. The aim of this talk is to provide insight to the security, architecture and yes you guessed it, vulnerability of the AMD System Management Unit (SMU) firmware found in modern AMD x86 processors.
Every modern x86 platform contains several other auxiliary processors, which kind of erase the line between pure hardware and software. How well are those processors secured? What is running on them? Is there a way to analyze them?
Great attention had the Intel ME engine, but similar, although not so unfriendly processor(s) exists on the AMD platforms too. The aim of this talk is to provide insight to the security, architecture and vulnerability of the AMD SMU firmware found in modern AMD x86 processors.
The SMU is designed to prevent unauthorized code execution, thus making it ideal candidate to verify if it is so. This is where the fun starts.
The overall goal is to educate the audience enough that they may (and want to) start to tinker around various non-x86 firmwares found on x86 systems on their own.
Info
Day:
2014-12-27
Start time:
21:45
Duration:
01:00
Room:
Saal 2
Track:
Security & Hacking
Language:
en
Links:
Files
Feedback
Click here to let us know how you liked this event.
Concurrent events
- Saal G
- The Cloud Conspiracy 2008-2014
- Saal 1
- ECCHacks
- Saal 6
- (In)Security of Mobile Banking
Speakers
Rudolf Marek |