Quote:
Originally Posted by qasdfdsaq
Thanks for the explanation
As for hardware protection - haven't we had TPM and Trusted Execution for a while now?
|
Hope it's actually correct
I think TPM can be bypassed by having the malware run from hardware, like in the firmware of graphics cards and such like. Just did a quick google and found this white paper:
Cloaking Malware with the Trusted Platform Module (PDF) which just goes to show that these things are far from perfect.
Had seen this
vulnerability on Trusted Execution before and there may be more:
Quote:
Last revised: 07/11/2014
Source: US-CERT/NIST
Overview
Unspecified vulnerability in the Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) before 1.2, as used by the Intel QM77, QS77, Q77 Express, C216, Q67 Express, C202, C204, and C206 chipsets and Mobile Intel QM67 and QS67 chipsets, when the measured launch environment (MLE) is invoked, allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.
|
Also
TPM Reset Attack
There are probably more and some better examples but only ones I can remember off the top of my head. The point being that hardware protection needs to get much better. It's a bit like consoles and how they get harder to crack on every generation except for the fact the NSA will always try and get weakness's put in to the hardware protection so I doubt hardware protection will ever be perfect either.