Dissecting the AMD Platform Security Processor
The AMD Platform Security Processor (PSP) is a security subsystem in AMD CPUs comparable to the Intel ME and was introduced in 2013. It is essential for system startup – in fact, in runs before the main processor is even started – and offers runtime services to the main processor. For this, it has full access to the system memory space (inlcuding MMIO).
The PSP runs undocumented, proprietary firmware. This talk presents efforts of investigating what the PSP does and if it's secure. For the first time, it documents the PSP firmware's proprietary filesystem and provides insights into reverse-engineering such a deeply embedded system as the PSP. The talk further sheds light on how we might regain trust in AMD CPUs despite the delicate nature of the PSP.
With the ongoing digitalization, not only the number of IT systems is increasing in many domains, but also the amount of software and hardware that forms the trusted computing base of an application. Applications in industrial systems, infrastructure and consumer electronics rely on the security of these systems. Emerging security technologies try to mitigate the risk of insecure software and hardware by embedding secure components into these untrusted systems.
AMD introduced the AMD Secure Processor to provide a trusted execution environment for critical operations. This talk comprehensively analyzes the undocumented and largely unknown security co-processor and discovers its inner workings. It aims to find out if it is able to keep its promise – or if it opens up another attack vector.
EVENT:
chaos communication camp 2019
SPEAKERS:
Christian Werling, Robert Buhren
PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed).
ATTRIBUTION CREDITS:
Original video source: https://www.youtube.com/watch?v=n9dhHG4tbE0
Видео Dissecting the AMD Platform Security Processor канала Coding Tech
The PSP runs undocumented, proprietary firmware. This talk presents efforts of investigating what the PSP does and if it's secure. For the first time, it documents the PSP firmware's proprietary filesystem and provides insights into reverse-engineering such a deeply embedded system as the PSP. The talk further sheds light on how we might regain trust in AMD CPUs despite the delicate nature of the PSP.
With the ongoing digitalization, not only the number of IT systems is increasing in many domains, but also the amount of software and hardware that forms the trusted computing base of an application. Applications in industrial systems, infrastructure and consumer electronics rely on the security of these systems. Emerging security technologies try to mitigate the risk of insecure software and hardware by embedding secure components into these untrusted systems.
AMD introduced the AMD Secure Processor to provide a trusted execution environment for critical operations. This talk comprehensively analyzes the undocumented and largely unknown security co-processor and discovers its inner workings. It aims to find out if it is able to keep its promise – or if it opens up another attack vector.
EVENT:
chaos communication camp 2019
SPEAKERS:
Christian Werling, Robert Buhren
PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed).
ATTRIBUTION CREDITS:
Original video source: https://www.youtube.com/watch?v=n9dhHG4tbE0
Видео Dissecting the AMD Platform Security Processor канала Coding Tech
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Spyware at The Hardware Level - Intel ME & AMD PSP36C3 - Uncover, Understand, Own - Regaining Control Over Your AMD CPULenovo vendor locking AMD CPUs to their boards: what's going on? Is this bad?AMD at CES 2020 in 10 minutesAMD Ryzen 7 ReleaseDissecting the AMD Platform Security ProcessorIf We Get RISC-V Security Right, It Will Become the Dominant Processor in the $470B IoT MarketFBI Demands User Data From Signal - Here's What They GotAMD Ryzen Precision Boost Overdrive & AutoOC Benchmarks & ExplanationPS3 Documentary: How Sony Fell From GraceWhy Good Developers Write Bad TestsTPM (Trusted Platform Module) - Computerphile128-Core AMD Epyc Rome Server Tear-Down, ft. Level1Techs10 Years Old: AMD Phenom II 1090T CPU in 2020 - Benchmarks vs. Ryzen & IntelLinus builds Linus’ new PC!Look at ME! Intel ME firmware investigation36C3 - Intel Management Engine deep diveJonathan Blow on Software Quality at the CSUA 1All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate...