Two vulnerabilities (CVE-2017-16837 and CVE-2018-6622) that can subvert the Trusted Platform Module (TPM) designed to provide hardware-based security functions without physical access #BHASIA Briefing by įinally, I Can Sleep Tonight: Catching Sleep Mode Vulnerabilities of the TPM with the Napper If you want the detailed information about CVE-2018-6622 and a vulnerability checking tool, please read our USENIX paper, A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping and Black Hat Asia presentation, Finally, I Can Sleep Tonight: Catching Sleep Mode Vulnerabilities of the TPM with Napper. They are related to the S3 sleeping state of Advanced Configuration and Power Interface (ACPI) and can reset the TPMs. BitLeaker uses the TPM vulnerability, CVE-2018-6622 for a discrete TPM and related vulnerability for a firmware TPM. #BlackHat #BHEU2019 /GCJ3Wo2kUg- Seunghun Han December 6, 2019īitLeaker is a new tool for extracting the VMK and mounting a BitLocker-locked partition. □ The presentation material and source code are published at and. My talk, BitLeaker, was over successfully! Thank you for attending.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |