Je hebt een klacht over de onderstaande posting:
In http://www.invisiblethingslab.com/resources/2011/Attacking_Intel_TXT_via_SINIT_hijacking.pdf lees ik: Door Rafal Wojtczuk en Joanna Rutkowska: [...] 12 Summary 1. SINITs are buggy just like any other software. Intel should consider open sourcing those critical pieces of code. 2. SINIT compromise allows more than \just" TXT bypass, e.g. it also allows SMM compromise, and perhaps something else. . . ? 3. It's a shame we still don't see STMs in the wild, even on Intel platforms! 4. Preventing our attack requires: 1) SINIT patching, 2) secrets resealing by customers, 3) BIOS upgrade, and finally 4) adding the BIOS to the chain of trust. The last two might have been avoided if we had STMs... [...] Ik wist niet goed wat een STM is. Na wat zoeken lees ik in http://invisiblethingslab.com/resources/bh09dc/Attacking%20Intel%20TXT%20-%20paper.pdf onder meer:Door Joanna Rutkowska: [...] TXT Design Problem While Intel does indeed have plans to patch the SMM-implementation bugs we have exploited in ...
Beschrijf je klacht (Optioneel):