34c3: Intel ME Myths and Reality

7. April 2018 von Chaos Computer Club e.V.

Intel ME Myths and Reality

Many claims were made recently about purpose and capabilities of the Intel ME but with all the buzz it is not always clear what are facts and what is just speculation. We'll try to clear the fog of misunderstanding with research based on investigations of ME firmware and practical experiments on ME-equipped hardware.

We would like to cover the most common claims about the ME, based in part on the new research done in the few last years such as complete recovery of the proprietary Huffman compression which previously hindered research into some parts of the ME firmware, as well as describe what steps can ordinary users take to reduce the attack surface exposed by the ME.

Some of the claims we plan to cover:

  • It's a backdoor made for NSA and serves no useful purpose
  • It is always on even if the PC is turned off
  • It can read all data on PC/spy on the user
  • It can't be disabled
  • It can lock the PC with a command sent over the air
  • It a black box which can't be audited because it's closed source
  • End users can't do anything about it.

Together with the talk we're planning to make available detailed notes on reverse engineering of the ME firmware with some pointers to the identified functionality for other interested researchers.

Source of lecture: 34c3

Lecturer: Igor Skochinsky, Nicola Corna

Event: 34c3, 34. Chaos Computer Congress

Location: Leipziger Messe, Germany

License: CC-BY

(Link to source material)

820 Aufrufe
0 Kommentare


Noch wurden keine Kommenare geschrieben.

Schreiben Sie einen Kommentar


Lecture, Technology

MediaDrop Video Plattform

Impressum | Datenschutzerklärung | Nutzungsbestimmungen | Über diese Webseite | Einstieg und Umgang mit OpenStreamer