The Lazy Genius

Security News & Brain Dumps from Xavier Ashe, a Bit9 Client Partner

Black Hat paper on breaking Trusted Platform Module withdrawn

Posted by Xavier Ashe on June 29, 2007

This is the abstract for a paper that was scheduled to be presented at Black Hat USA 2007 security conference next month. It was removed without explanation from the conference Web site this week, and promised to circumvent security afforded by Trusted Platform Module chips:

“…The attack procedure (TPMkit) involves an attack on the TPM chip.
TPMkit lets you overcome technologies such as Vista's BitLocker. TPMkit
also bypasses remote attestation and thus, will allow to connect over
Trusted Network Connect(TNC) (although the system might not be in
Trusted state).

TPMkit bypasses the security checks mentioned (in the above paragraphs) and thus, you will never know that you are using a
compromised or changed system.

We
will be demonstrating how to break TPM. The demonstration would include
a few live demonstrations. For example, one demonstration will show how
to login and access data on a Windows Vista System (which has TPM +
BitLocker enabled).

More information on TPMkit (as it evolves) will be released.”

Read the full abstract on NetworkWorld.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: