back

Inside Intel Management Engine

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:51:46
Language
English
Abstract
Positive Technologies researchers Maxim Goryachy and Mark Ermolov have discovered a vulnerability that allows running unsigned code. The vulnerability can be used to activate JTAG debugging for the Intel Management Engine processor core. When combined with DCI, this allows debugging ME via USB.

Intel Management Engine is a proprietary technology that consists of a microcontroller integrated into the Platform Controller Hub (PCH) microchip with a set of built-in peripherals. The PCH carries communication between the processor and external devices; therefore, Intel ME has access to some critical data on the computer, and the ability to execute third-party code allows compromising the platform completely.
Researchers have been long interested in such capabilities, but recently we have seen a surge of interest in Intel ME.
Intel provides its engineers with the ability to perform ME debugging via JTAG, in addition to allowing third-party developers to debug ISH via DCI (as previously discussed by us at 33с3). Anyone could use the vulnerability we have found to activate JTAG debugging for ME. In our presentation, we will describe the built-in ME debugging mechanism and how to activate it with the help of this vulnerability.

Talk ID
8762
Event:
34c3
Day
1
Room
Saal Borg
Start
4:30 p.m.
Duration
01:00:00
Track
Security
Type of
lecture
Speaker
Maxim Goryachy
Mark Ermolov
Talk Slug & media link
34c3-8762-inside_intel_management_engine

Talk & Speaker speed statistics

Very rough underestimation:
80.3 wpm
442.6 spm
100.0% Checking done100.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
0.0% Nothing done yet0.0%
  

Work on this video on Amara!

Talk & Speaker speed statistics with word clouds

Whole talk:
80.3 wpm
442.6 spm
intelmaximmicjtagregisterkeysignalangelrom1systemmicrophonedevicequestionkeysdebuggingreadnumberinternalusbvulnerabilityexamplepublicaccessdfxmanagementplatformconfigurationhardwarepartitioninterfacesetenginedalcpumodulefilecorecalledresetfirmwareunlockbupspecialportssoftwaredebugtalkfilesflash