Back to Results
First PageMeta Content
X86 architecture / IBM PC compatibles / Hardware virtualization / X86 virtualization / IOMMU / Trusted Execution Technology / DMA attack / MOV / Southbridge / System software / Computer hardware / Computing


Another Way to Circumvent IntelĀ® Trusted Execution Technology Tricking SENTER into misconfiguring VT-d via SINIT bug exploitation Rafal Wojtczuk Joanna Rutkowska
Add to Reading List

Document Date: 2009-12-21 13:05:46


Open Document

File Size: 332,91 KB

Share Result on Facebook

City

Washington / DC / Q45 / /

Company

Las Vegas NV / Citrix / Intel Corp. / Intel Press / HDD / /

Country

United States / /

Currency

pence / USD / AMD / CAD / SGD / /

/

Event

Force Majeure / /

Facility

PCI Express Port / BAR BARs / /

IndustryTerm

ordinary device / computing / vPro systems / System software / /

OperatingSystem

VMs / /

Organization

Invisible Things Lab / DMA Remapping Unit / /

Person

Joanna Rutkowska / Alexande Tereshkin / Alexander Tereshkin / Joseph Cihula / Rafal Wojtczuk / David Grawrock / Patrick Gelsinger / Ian Pratt / /

Position

driver / vp / disk controller / HDD controller / Private / Memory Controller / DRAM Controller / Controller / programmer / /

ProgrammingLanguage

D / L / R / LPC / /

ProvinceOrState

Maine / /

RadioStation

Core 0 / /

Technology

encryption / VTd technology / flash / pdf / cmp / /

URL

http /

SocialTag