Earlier this year our team has presented an attack against Intel ® TXT that exploited a design problem with SMM mode being over privileged on PC platforms and able to interfere with the SENTER instruction. This time we present a different attack that allows an attacker to trick the SENTER instruction into misconfiguring the VT-d engine, so that it doesnʼt protect the newly loaded MLE. This attack exploits implementation flaws in a so called SINIT module
In January 2018, we discovered the Foreshadow transient execution attack (USENIX Security’18) target...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
Integrated Circuits (ICs) are sensible to a wide range of (passive, active, invasive, non-invasive) ...
In this paper we present the results of our research into security of the Intel ® Trusted Execution ...
In this paper we describe novel practical attacks on SMM memory (SMRAM) that exploit CPU caching sem...
We describe principles and implementation details of UEFI BIOS attacks and vulnerabilities, suggesti...
The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change ...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in rec...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Recent years have seen a growing concern over System Management Mode (SMM) and its broad access to p...
This paper analyzes a previously overlooked attack surface that allows unprivileged adversaries to i...
International audienceI/O attacks have received increasing attention during the last decade. These a...
International audienceAttacks targeting computer systems become more and more complex and various. S...
In January 2018, we discovered the Foreshadow transient execution attack (USENIX Security’18) target...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
Integrated Circuits (ICs) are sensible to a wide range of (passive, active, invasive, non-invasive) ...
In this paper we present the results of our research into security of the Intel ® Trusted Execution ...
In this paper we describe novel practical attacks on SMM memory (SMRAM) that exploit CPU caching sem...
We describe principles and implementation details of UEFI BIOS attacks and vulnerabilities, suggesti...
The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change ...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in rec...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Recent years have seen a growing concern over System Management Mode (SMM) and its broad access to p...
This paper analyzes a previously overlooked attack surface that allows unprivileged adversaries to i...
International audienceI/O attacks have received increasing attention during the last decade. These a...
International audienceAttacks targeting computer systems become more and more complex and various. S...
In January 2018, we discovered the Foreshadow transient execution attack (USENIX Security’18) target...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
Integrated Circuits (ICs) are sensible to a wide range of (passive, active, invasive, non-invasive) ...