UEFI changing rootk...
 
Notifications
Clear all

UEFI changing rootkit

4 Posts
2 Users
0 Reactions
624 Views
RolfGutmann
(@rolfgutmann)
Noble Member
Joined: 10 years ago
Posts: 1185
Topic starter  

How to protect the BIOS/UEFI settings from being changed by rootkit? I am the first claiming that this is not an IT Security forum, but we in-lab want to improve protection. You may nevertheless can give us a hint. BIOS passwording does not help.

Thank you.


   
Quote
(@c-r-s)
Estimable Member
Joined: 14 years ago
Posts: 170
 

This is commonly solved through TPM attestation (not really, but sort of; see all of Joanna Rutkowska's talks and related ones).

Edit typo in Joanna's name.


   
ReplyQuote
RolfGutmann
(@rolfgutmann)
Noble Member
Joined: 10 years ago
Posts: 1185
Topic starter  

C.R.S - you have a high knowledge of security aspects. Great respect & Thank you!


   
ReplyQuote
RolfGutmann
(@rolfgutmann)
Noble Member
Joined: 10 years ago
Posts: 1185
Topic starter  

Pls see the CPU's features of an Intel i7-7500 processor

http//ark.intel.com/products/95451/Intel-Core-i7-7500U-Processor-4M-Cache-up-to-3_50-GHz-

Does any of the features of 'Security & Reliability' cover the protection against UEFI-changing rootkits? In short Does a CPU with higher security (e.g. vPro) help to protect (e.g. OS Guard)?

We had a machine with this CPU which was rootkit-infected while testing.


   
ReplyQuote
Share: