1 |
On 2020-03-07, Rich Freeman <rich0@g.o> wrote: |
2 |
|
3 |
> In this case we're talking about a TPM where a threat model |
4 |
> is an attacker with physical access that is trying to play games with |
5 |
> the busses/etc, and as such it is important that it initialize using |
6 |
> code in ROM that is known-good. |
7 |
|
8 |
Note that the person behind the attack doesn't need physical |
9 |
access. If an attacker can shove malicious firmware into something |
10 |
like a PCI card with DMA bus-master capabilities, then on power-up |
11 |
that card can carry out the attack. However, getting the firmware |
12 |
into the PCI card would probably require root privledges, so there |
13 |
would need to be a pre-existing privledge-elevation vulnerability. |
14 |
|
15 |
I think. :) |
16 |
|
17 |
-- |
18 |
Grant |