34C3 - Inside Intel Management Engine
- Title:
- 34C3 - Inside Intel Management Engine
- Description:
-
more » « less
https://media.ccc.de/c/34c3/34c3-8762-inside_intel_management_engine
Positive Technologies researchers Maxim Goryachy and Mark Ermolov have discovered a vulnerability that allows running unsigned code. The vulnerability can be used to activate JTAG debugging for the Intel Management Engine processor core. When combined with DCI, this allows debugging ME via USB.
Maxim Goryachy Mark Ermolov
https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8762.html
- Video Language:
- English
- Duration:
- 51:47
Error250 edited English subtitles for 34C3 - Inside Intel Management Engine | ||
C3Subtitles edited English subtitles for 34C3 - Inside Intel Management Engine | ||
taam edited English subtitles for 34C3 - Inside Intel Management Engine | ||
taam edited English subtitles for 34C3 - Inside Intel Management Engine | ||
C3Subtitles edited English subtitles for 34C3 - Inside Intel Management Engine | ||
Bar Sch changed primary url from ftp://127.0.0.1/congress/34c3/h264-hd/34c3-8762-eng-Inside_Intel_Management_Engine.mp4 to http://www.youtube.com/watch?v=JMEJCLX2dtw | ||
Bar Sch changed primary url from http://www.youtube.com/watch?v=JMEJCLX2dtw to ftp://127.0.0.1/congress/34c3/h264-hd/34c3-8762-eng-Inside_Intel_Management_Engine.mp4 | ||
Bar Sch added new URL for 34C3 - Inside Intel Management Engine |