SlideShare a Scribd company logo
Anti Evil Maid
(Anti) Evil Maid for Intel and AMD
Michał Żygowski
1 / 12
PC Engines platforms maintainer
interested in:
advanced hardware and
firmware features
coreboot
@_miczyg_
michal.zygowski@3mdeb.com
linkedin.com/in/miczyg
facebook.com/miczyg1395
Michał Żygowski
Firmware Engineer
Introduction
2 / 12
Anti Evil Maid for Intel and AMD
All Rights Reserved © 2019 | Michał Żygowski
Evil Maid attacks
3 / 12
Anti Evil Maid for Intel and AMD
All Rights Reserved © 2019 | Michał Żygowski
Short recap:
burn Evil Maid SUB stick
boot target machine from the prepared stick
injecting key loggers, password sniffers
wait machine owner launches the machine and types password
boot again from Evil Maid stick
retrieve password saved by key-logger or password sniffer on the disk
enjoy a new laptop/PC
1st phase take about 2 minutes (first boot of Evil Maid USB and malicious
software installation). 2nd phase also may take about 2 minutes.
Very high reward ("ownership" of a new PC) at a cost of single USB stick and
some amount of time.
Source: http://theinvisiblethings.blogspot.com/2009/10/evil-maid-goes-after-truecrypt.html
Evil Maid attacks
4 / 12
Anti Evil Maid for Intel and AMD
All Rights Reserved © 2019 | Michał Żygowski
How should we protect ourselves?
TrueCrypt Developer: Given the scope of our product, how the user ensures
physical security is not our problem. Anyway, to answer your question (as a
side note), you could use e.g. a proper safety case with a proper lock (or,
when you cannot have it with you, store it in a good strongbox).
Joanna Rutkowska: If I could arrange for a proper lock or an impenetrable
strongbox, then why in the world should I need encryption?
Source: http://theinvisiblethings.blogspot.com/2009/10/evil-maid-goes-after-truecrypt.html
Evil Maid attacks
5 / 12
Anti Evil Maid for Intel and AMD
All Rights Reserved © 2019 | Michał Żygowski
Protection by ensuring the state of the platform.
If we can trust the hardware and software we use, can we feel safe?
How to determine if the state of the platform is trusted and
hardware/firmware/software has not been tampered?
Trusted Execution / Trusted Computing:
TPM module by TCG
Intel TXT
AMD Secure Launch with SKINIT
Anti Evil Maid
6 / 12
Anti Evil Maid for Intel and AMD
All Rights Reserved © 2019 | Michał Żygowski
AMD Secure Launch
TPM required
no blobs required
implementation: Trenchboot (WIP)
BIOS needs to enable SVM
Only 1 SKINIT instruction
Intel TXT
TPM required
BIOS ACM and SINIT ACM required
implementation: tboot
BIOS needs to enable VT-x, VT-d,
load BIOS ACM
many GETSEC sub-instructions
called leaf functions
Can we trust hardware features silicon
vendors provide?
AMD vs Intel
7 / 12
Anti Evil Maid for Intel and AMD
All Rights Reserved © 2019 | Michał Żygowski
sudo qubes-dom0-update anti-evil-maid
Additional protection:
multi-factor with AEM USB boot device and TOTP
using 2 AEM USB sticks in case one could be stolen
using non-default SRK password
using additional secret key file for LUKS on AEM USB
Attack still not prevented:
attacker can sniff passwords, keystrokes and access AEM USB stick
fake motherboard injection with radio link
successful measurement bypass by buggy CRTM implementations in BIOS
buggy BIOS updates leading to BIOS compromise
SMM attacks leading to Intel TXT compromise
https://www.qubes-os.org/doc/anti-evil-maid/
https://github.com/QubesOS/qubes-antievilmaid/blob/master/anti-evil-maid/README
Qubes OS Anti-Evil-Maid
8 / 12
Anti Evil Maid for Intel and AMD
All Rights Reserved © 2019 | Michał Żygowski
Current AEM status:
only for Intel silicon
not supported on UEFI installations
TPM 1.2 only
Qubes OS Anti-Evil Maid
9 / 12
Anti Evil Maid for Intel and AMD
All Rights Reserved © 2019 | Michał Żygowski
On PSEC2018 Lengyel and Karrigan presents AEM with UEFI and Xen.
SRTM:
shim verification and measurement
shim measures and verifies Xen
Xen loads Dom0, shim verifies and measures Dom0 kernel and initrd
GRUB-like configs to pass boot parameters, also measured
rootfs read-only, can't properly measure accessed files in multi-core
systems
DRTM:
tboot loaded from Xen EFI, measured by shim
second copy of Xen measured and verified by shim
build multiboot struct in Xen EFI to point to second Xen EFI copy
launch tboot using multiboot struct
Sounds like an entanglement... Still no AMD support.
https://www.platformsecuritysummit.com/2018/speaker/kerrigan/PSEC2018-Anti-Evil-Maid-UEFI-Xen-Brendan-Kerrigan.pdf
Ani-Evil Maid in UEFI
10 / 12
Anti Evil Maid for Intel and AMD
All Rights Reserved © 2019 | Michał Żygowski
Bonus
Evil maid attacking You in the Sims
11 / 12
Anti Evil Maid for Intel and AMD
All Rights Reserved © 2019 | Michał Żygowski
Q&A
12 / 12
Anti Evil Maid for Intel and AMD
All Rights Reserved © 2019 | Michał Żygowski

More Related Content

PPTX
PPT
IWMW 1999: Web SIte Security
PDF
Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
PDF
BlueHat v18 || An ice-cold boot to break bit locker
PPT
[HackInTheBox] Breaking virtualization by any means
PPT
Bigger On The Inside
PDF
Tkos secure boot_lecture_20190605
PDF
OSDC 2019 | Ignite: Microcode updates as protection against Spectre & Co. by ...
IWMW 1999: Web SIte Security
Android Security Development - Part 2: Malicious Android App Dynamic Analyzi...
BlueHat v18 || An ice-cold boot to break bit locker
[HackInTheBox] Breaking virtualization by any means
Bigger On The Inside
Tkos secure boot_lecture_20190605
OSDC 2019 | Ignite: Microcode updates as protection against Spectre & Co. by ...

Similar to Status of AEM for Intel and AMD (20)

PDF
Anti-evil maid with UEFI and Xen
PPTX
Bootkits step by-step-slides-final-v1-release
PPTX
BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing
PPT
Joanna Rutkowska Subverting Vista Kernel
PDF
Acpi and smi handlers some limits to trusted computing
PPT
Rootkit Hunting & Compromise Detection
ODP
Hardware backdooring is practical : slides
PDF
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
PDF
Attacking intel txt paper
PPTX
Hypervisor and VDI security
PDF
Breaking hardware enforced security with hypervisors
PDF
Bootkits: past, present & future
PDF
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
PDF
Back to the Future with Platform Security - HardwearIO USA 2023
ODP
[Defcon] Hardware backdooring is practical
PDF
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan Auth
PDF
HITBSecConf 2017-Shadow-Box-the Practical and Omnipotent Sandbox
PDF
Designing and implementing malicious processors
PDF
Embedded device-care Point of View - security
ODP
Persistent BIOS Infection
Anti-evil maid with UEFI and Xen
Bootkits step by-step-slides-final-v1-release
BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing
Joanna Rutkowska Subverting Vista Kernel
Acpi and smi handlers some limits to trusted computing
Rootkit Hunting & Compromise Detection
Hardware backdooring is practical : slides
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Attacking intel txt paper
Hypervisor and VDI security
Breaking hardware enforced security with hypervisors
Bootkits: past, present & future
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Back to the Future with Platform Security - HardwearIO USA 2023
[Defcon] Hardware backdooring is practical
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan Auth
HITBSecConf 2017-Shadow-Box-the Practical and Omnipotent Sandbox
Designing and implementing malicious processors
Embedded device-care Point of View - security
Persistent BIOS Infection
Ad

More from Piotr Król (11)

PDF
D-RTM for Qubes OS VMs
PDF
S-RTM for Qubes OS VMs
PDF
Qubes hardware certification
PDF
Qubes OS and TPM 2.0
PDF
Lightning talks - Qubes OS and 3mdeb "minisummit" 2019
PDF
RTE v1.0.0 specification
PDF
BITS and CHIPSEC as coreboot payloads
PDF
How to enable AMD IOMMU in coreboot?
PDF
Enabling TPM 2.0 on coreboot based devices
PDF
Booting UEFI-aware OS on coreboot enabled platform - "In God's Name, Why?"
PDF
How to build IoT solution using cloud infrastructure?
D-RTM for Qubes OS VMs
S-RTM for Qubes OS VMs
Qubes hardware certification
Qubes OS and TPM 2.0
Lightning talks - Qubes OS and 3mdeb "minisummit" 2019
RTE v1.0.0 specification
BITS and CHIPSEC as coreboot payloads
How to enable AMD IOMMU in coreboot?
Enabling TPM 2.0 on coreboot based devices
Booting UEFI-aware OS on coreboot enabled platform - "In God's Name, Why?"
How to build IoT solution using cloud infrastructure?
Ad

Recently uploaded (20)

PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PPTX
Introduction to Windows Operating System
PPTX
Patient Appointment Booking in Odoo with online payment
PPTX
Custom Software Development Services.pptx.pptx
PDF
Types of Token_ From Utility to Security.pdf
PPTX
chapter 5 systemdesign2008.pptx for cimputer science students
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
Time Tracking Features That Teams and Organizations Actually Need
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
MCP Security Tutorial - Beginner to Advanced
Advanced SystemCare Ultimate Crack + Portable (2025)
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
wealthsignaloriginal-com-DS-text-... (1).pdf
Why Generative AI is the Future of Content, Code & Creativity?
Introduction to Windows Operating System
Patient Appointment Booking in Odoo with online payment
Custom Software Development Services.pptx.pptx
Types of Token_ From Utility to Security.pdf
chapter 5 systemdesign2008.pptx for cimputer science students
Designing Intelligence for the Shop Floor.pdf
Digital Systems & Binary Numbers (comprehensive )
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Time Tracking Features That Teams and Organizations Actually Need
Weekly report ppt - harsh dattuprasad patel.pptx
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
MCP Security Tutorial - Beginner to Advanced

Status of AEM for Intel and AMD

  • 1. Anti Evil Maid (Anti) Evil Maid for Intel and AMD Michał Żygowski 1 / 12
  • 2. PC Engines platforms maintainer interested in: advanced hardware and firmware features coreboot @_miczyg_ michal.zygowski@3mdeb.com linkedin.com/in/miczyg facebook.com/miczyg1395 Michał Żygowski Firmware Engineer Introduction 2 / 12 Anti Evil Maid for Intel and AMD All Rights Reserved © 2019 | Michał Żygowski
  • 3. Evil Maid attacks 3 / 12 Anti Evil Maid for Intel and AMD All Rights Reserved © 2019 | Michał Żygowski
  • 4. Short recap: burn Evil Maid SUB stick boot target machine from the prepared stick injecting key loggers, password sniffers wait machine owner launches the machine and types password boot again from Evil Maid stick retrieve password saved by key-logger or password sniffer on the disk enjoy a new laptop/PC 1st phase take about 2 minutes (first boot of Evil Maid USB and malicious software installation). 2nd phase also may take about 2 minutes. Very high reward ("ownership" of a new PC) at a cost of single USB stick and some amount of time. Source: http://theinvisiblethings.blogspot.com/2009/10/evil-maid-goes-after-truecrypt.html Evil Maid attacks 4 / 12 Anti Evil Maid for Intel and AMD All Rights Reserved © 2019 | Michał Żygowski
  • 5. How should we protect ourselves? TrueCrypt Developer: Given the scope of our product, how the user ensures physical security is not our problem. Anyway, to answer your question (as a side note), you could use e.g. a proper safety case with a proper lock (or, when you cannot have it with you, store it in a good strongbox). Joanna Rutkowska: If I could arrange for a proper lock or an impenetrable strongbox, then why in the world should I need encryption? Source: http://theinvisiblethings.blogspot.com/2009/10/evil-maid-goes-after-truecrypt.html Evil Maid attacks 5 / 12 Anti Evil Maid for Intel and AMD All Rights Reserved © 2019 | Michał Żygowski
  • 6. Protection by ensuring the state of the platform. If we can trust the hardware and software we use, can we feel safe? How to determine if the state of the platform is trusted and hardware/firmware/software has not been tampered? Trusted Execution / Trusted Computing: TPM module by TCG Intel TXT AMD Secure Launch with SKINIT Anti Evil Maid 6 / 12 Anti Evil Maid for Intel and AMD All Rights Reserved © 2019 | Michał Żygowski
  • 7. AMD Secure Launch TPM required no blobs required implementation: Trenchboot (WIP) BIOS needs to enable SVM Only 1 SKINIT instruction Intel TXT TPM required BIOS ACM and SINIT ACM required implementation: tboot BIOS needs to enable VT-x, VT-d, load BIOS ACM many GETSEC sub-instructions called leaf functions Can we trust hardware features silicon vendors provide? AMD vs Intel 7 / 12 Anti Evil Maid for Intel and AMD All Rights Reserved © 2019 | Michał Żygowski
  • 8. sudo qubes-dom0-update anti-evil-maid Additional protection: multi-factor with AEM USB boot device and TOTP using 2 AEM USB sticks in case one could be stolen using non-default SRK password using additional secret key file for LUKS on AEM USB Attack still not prevented: attacker can sniff passwords, keystrokes and access AEM USB stick fake motherboard injection with radio link successful measurement bypass by buggy CRTM implementations in BIOS buggy BIOS updates leading to BIOS compromise SMM attacks leading to Intel TXT compromise https://www.qubes-os.org/doc/anti-evil-maid/ https://github.com/QubesOS/qubes-antievilmaid/blob/master/anti-evil-maid/README Qubes OS Anti-Evil-Maid 8 / 12 Anti Evil Maid for Intel and AMD All Rights Reserved © 2019 | Michał Żygowski
  • 9. Current AEM status: only for Intel silicon not supported on UEFI installations TPM 1.2 only Qubes OS Anti-Evil Maid 9 / 12 Anti Evil Maid for Intel and AMD All Rights Reserved © 2019 | Michał Żygowski
  • 10. On PSEC2018 Lengyel and Karrigan presents AEM with UEFI and Xen. SRTM: shim verification and measurement shim measures and verifies Xen Xen loads Dom0, shim verifies and measures Dom0 kernel and initrd GRUB-like configs to pass boot parameters, also measured rootfs read-only, can't properly measure accessed files in multi-core systems DRTM: tboot loaded from Xen EFI, measured by shim second copy of Xen measured and verified by shim build multiboot struct in Xen EFI to point to second Xen EFI copy launch tboot using multiboot struct Sounds like an entanglement... Still no AMD support. https://www.platformsecuritysummit.com/2018/speaker/kerrigan/PSEC2018-Anti-Evil-Maid-UEFI-Xen-Brendan-Kerrigan.pdf Ani-Evil Maid in UEFI 10 / 12 Anti Evil Maid for Intel and AMD All Rights Reserved © 2019 | Michał Żygowski
  • 11. Bonus Evil maid attacking You in the Sims 11 / 12 Anti Evil Maid for Intel and AMD All Rights Reserved © 2019 | Michał Żygowski
  • 12. Q&A 12 / 12 Anti Evil Maid for Intel and AMD All Rights Reserved © 2019 | Michał Żygowski