• rtxn
    arrow-up
    82
    arrow-down
    0
    ·
    3 months ago
    link
    fedilink

    The dedicated TPM chip is already being used for side-channel attacks. A new processor running arbitrary code would be a black hat’s wet dream.

    • MajorHavoc
      arrow-up
      51
      arrow-down
      0
      ·
      3 months ago
      link
      fedilink

      It will be.

      IoT devices are already getting owned at staggering rates. Adding a learning model that currently cannot be secured is absolutely going to happen, and going to cause a whole new large batch of breaches.

    • barsquid
      arrow-up
      5
      arrow-down
      0
      ·
      3 months ago
      link
      fedilink

      Do you have an article on that handy? I like reading about side channel and timing attacks.

      • rtxn
        arrow-up
        19
        arrow-down
        0
        ·
        3 months ago
        link
        fedilink

        TPM-FAIL from 2019. It affects Intel fTPM and some dedicated TPM chips: link

        The latest (at the moment) UEFI vulnerability, UEFIcanhazbufferoverflow is also related to, but not directly caused by, TPM on Intel systems: link

        • barsquid
          arrow-up
          3
          arrow-down
          0
          ·
          3 months ago
          link
          fedilink

          That’s insane. How can they be doing security hardware and leave a timing attack in there?

          Thank you for those links, really interesting stuff.

    • Blue_Morpho
      arrow-up
      3
      arrow-down
      1
      ·
      3 months ago
      link
      fedilink

      It’s not a full CPU. It’s more limited than GPU.

      • rtxn
        arrow-up
        19
        arrow-down
        1
        ·
        3 months ago
        link
        fedilink

        That’s why I wrote “processor” and not CPU.

        • Blue_Morpho
          arrow-up
          1
          arrow-down
          0
          ·
          3 months ago
          edit-2
          3 months ago
          link
          fedilink

          A processor that isn’t Turing complete isn’t a security problem like the TPM you referenced. A TPM includes a CPU. If a processor is Turing complete it’s called a CPU.

          Is it Turing complete? I don’t know. I haven’t seen block diagrams that show the computational units have their own cpu.

          CPUs also have co processer to speed up floating point operations. That doesn’t necessarily make it a security problem.