Convenient remote controls save system administrators many forces - and at the same time they represent a huge security threat in the event that they cannot be disabled by hardware using a jumper or switch on system board. Block Intel Management Engine 11 in modern Intel platforms represents just such a danger - initially it cannot be disabled and, moreover, some mechanisms of initialization and operation of the processor are tied to it, so a rough deactivation can simply lead to a complete inoperability of the system. The vulnerability lies in the Intel Active Management Technology (AMT) technology and, with a successful attack, allows you to gain full control over the system, which was discussed back in May of this year. But researchers from Positive Technologies .
The IME processor itself is part of the System Hub (PCH) chip. Excluding processor slots PCI Express, all communication between the system and the outside world goes through the PCH, which means that the IME has access to almost all data. Prior to version 11, an attack along this vector was unlikely: the IME processor used its own architecture with the ARC instruction set, about which little was known to third-party developers. But in version 11, the technology was played a bad joke: it was transferred to the x86 architecture, and the modified MINIX was used as the OS, which means that third-party binary code research was greatly simplified: both the architecture and the OS are well documented. Russian researchers Dmitry Sklyarov, Mark Yermolov and Maxim Goryachy managed to decrypt the IME version 11 executable modules and began their thorough study.
Intel AMT technology has a vulnerability score of 9.8 out of 10. Unfortunately, completely disabling IME on modern platforms is not possible for the reason described above - the subsystem is closely related to CPU initialization and startup, as well as power management. But from a flash memory image containing IME modules, you can remove everything superfluous, although it is very difficult to do this, especially in version 11. The me_cleaner project is actively developing, a utility that allows you to remove the common part of the image and leave only the vital necessary components. But let's give a small comparison: if in versions of IME up to 11 (before Skylake) the utility deleted almost everything, leaving about 90 KB of code, then currently it is necessary to save about 650 KB of code - and in some cases the system may turn off after half an hour, since the block The IME goes into recovery mode.
There are moves, however. The aforementioned group of researchers managed to use a development kit provided by Intel itself, which includes the Flash Image Tool utilities for configuring IME settings and the Flash Programming Tool, which works through an on-board SPI controller. Intel does not publish these programs in open access, but finding them on the web is not difficult.
The XML files obtained using this kit were analyzed (they contain the structure of the IME firmware and the description of the PCH strap mechanism). One bit called "reserve_hap" (HAP) seemed suspicious due to the description of "High Assurance Platform (HAP) enable". A web search revealed that it was the name of a high-trust platform program affiliated with the US NSA. Turning this bit on indicated that the system was in Alt Disable Mode. The IME block did not respond to commands and did not respond to inputs from the operating system. There are also a number of more subtle nuances that can be found in the article on Habrahabr.ru, but in new version me_cleaner has already implemented support for most dangerous modules without setting the HAP bit, which puts the IME engine in a "TemporaryDisable" state.
The last modification of me_cleaner leaves even in the 11th version of IME only the RBE, KERNEL, SYSLIB and BUP modules, no code was found in them to enable the IME system itself. In addition to them, you can use the HAP bit to be sure that the utility also knows how to do it. Intel has reviewed the results of the research and has confirmed that a number of IME settings are indeed related to government needs for enhanced security. These settings were introduced at the request of US government customers, they have undergone limited testing, and these configurations are not officially supported by Intel. The company also denies introducing so-called backdoors into its products.
A long time ago, when personal computers were purchased abroad in batches of several hundred pieces, and not in millions of "circulations", under the auspices of one of the KGB departments, small commercial offices were organized to "search for bookmarks." Now we all understand very well that it was one of the fair ways withdrawal of money, because at that level of support and organization you could find anything, but not a bookmark as part of the chips. But large buyers from among state offices and enterprises still had nowhere to go. They paid.
advertising
Today, Intel does not even hide the fact that the processors and chipsets of modern computer platforms have built-in tools for remote PC control. Widely advertised Intel technology Active Management Technology (AMT) should help simplify remote system maintenance - diagnostics and recovery - without user intervention. But no one is insured that you can also use AMT administrator rights for malicious purposes, and, as it turns out, there is not just a bookmark, there is a whole "trap".According to a publication by security expert Damien Zammit, modern Intel chipsets have an integrated local and isolated Intel Management Engine (Intel ME) microcontroller chip. This is a solution with its own firmware, which is not available for study by third-party tools and with the rights of full control over the processor, memory and the system as a whole. Moreover, the controller can work with the PC turned off, as long as the power is supplied to the memory. Of course, the operating system and utilities will neither sleep nor spirit know about the activity of the controller and will not sound the alarm while it is working with the system and data.
Search for electronic devices for intercepting information using electromagnetic field indicators
COURSE WORK
Specialty "10.02.01 Organization and technology of information security"
Completed by: Shevchenko Konstantin Pavlovich
student group number 342
_______________/_____________/
signature F.I.O.
"____" ___________2016
Checked:
Teacher
_______________/S.V. Lutovinov/
signature F.I.O.
"____" ___________2016
Tomsk 2016
Introduction. 3
Types of bookmarks. four
Acoustic bookmarks. 4
Phone bookmarks. 7
Hardware bookmarks. 8
Electromagnetic field indicators. ten
RF meters. 13
Scanner receivers and spectrum analyzers. fourteen
Hardware-software and special control complexes. 16
Radiation detection system. 17
Means of control of wire lines. eighteen
Nonlinear locators and metal detectors. twenty
Bookmark detection. 21
Conclusion. 22
Literature. 23
Introduction
Information has long ceased to be personal. It has acquired a tangible cost weight, which is clearly determined by the real profit received when using it, or the amount of damage, with varying degrees of probability, caused to the owner of the information. However, the creation of information generates whole line difficult problems. One of these problems is the reliable maintenance of the safety and established status of information circulating and processed in information-computing systems and networks. This problem came into use under the name of the problem of information security.
A special check is a set of engineering and technical measures carried out using control and measuring equipment, including specialized technical means, aimed at preventing interception technical information containing information constituting a state secret, personal, with the help of embedded in protected technical means and products of special electronic stowing devices.
Target term paper: to get acquainted with the basics and means of searching for electronic devices for intercepting information using electromagnetic field indicators in theory and practice.
Types of bookmarks
Acoustic bookmarks are special miniature electronic devices interception of acoustic (speech) information, covertly installed in rooms or machines. Information intercepted by acoustic bookmarks can be transmitted via radio or optical channel, via the power grid alternating current, by telephone line, as well as by the metal structures of buildings, pipes of heating and water supply systems, etc.
Rice. 1. Acoustic radio bookmark
The most widely used are acoustic bookmarks that transmit information over a radio channel. Such devices are often called radio bookmarks. Depending on the propagation medium of acoustic vibrations, radio bookmarks are divided into acoustic radio bookmarks and radio stethoscopes.
Acoustic radio bugs are designed to intercept acoustic signals through a direct acoustic (air) channel of information leakage. The sensitive element in them is, as a rule, an electret microphone.
Rice. 2. Radio stethoscope
The radio stethoscope is designed to intercept acoustic signals propagating along the vibroacoustic (walls, ceilings, floors, water supply, heating, ventilation pipes, etc.) leakage channel. They usually use piezomicrophones or accelerometric sensors as sensitive elements. In order to increase the operating time, these acoustic bookmarks can be equipped with control systems for turning on the radio transmitter from voice, as well as systems remote control. To receive information transmitted by radio bookmarks and radio stethoscopes, scanner receivers and software and hardware control systems are used.
In addition to bookmarks that transmit information over the radio, there are bookmarks in which 220 V power lines are used to transmit information. Such acoustic bookmarks are called network. To intercept information transmitted by network bookmarks, special receivers are used that are connected to the power network within the building.
In practice, it is also possible to use acoustic bookmarks that transmit information through the lines of security and fire alarm systems, as well as telephone lines. The simplest device that transmits information over a telephone line is the so-called "telephone ear" device (Fig. 3).
Rice. 3. Telephone ear TU-2
Phone bookmarks designed to eavesdrop on information transmitted over telephone lines. Usually done in the form separate module or disguised as elements telephone set, telephone plug or socket.
To intercept information in such bookmarks, two methods are used: contact and non-contact methods. With the contact method, information is taken by direct connection to a controlled line. With the non-contact method, information is collected using a miniature inductive sensor, which eliminates the possibility of establishing the fact of eavesdropping on information.
The transfer of information using a telephone bookmark begins at the moment the subscriber picks up the handset.
Rice. 4. Phone bookmark
Hardware bookmarks- these are electronic devices illegally and covertly installed in technical means of processing and transmitting information (computers) in order to ensure information leakage, violation of its integrity or blocking at the right time. Made in the form of standard modules used in computers, with minor modifications. As a rule, they are placed in a computer when assembling a computer by order of an enterprise of interest, as well as during troubleshooting or modifications carried out during a service or warranty period.
Rice. 5. Hardware bookmark
With the help of hardware bookmarks, it is possible to intercept data, for example, I / O data personal computer: monitor image; data entered from the keyboard, sent to the printer, written to internal and external media.
In addition to acoustic, telephone and hardware bookmarks for unauthorized retrieval of information, portable video recorders.
Broadcast from video cameras can be directly recorded on a video recorder, or transmitted over a radio channel using special transmitters. If, in addition to the video image, sound transmission is required, then a microphone is installed together with the video camera. As a rule, video image transmitters are made as a separate unit, while having a small size and weight. But there are cases when they are structurally combined with television cameras (Fig. 5).
Rice. 6. Video transmitter
Video cameras and transmitters are powered either from built-in batteries, while the operating time, as a rule, does not exceed several hours, or from the 220 V mains, while their operation time is practically unlimited.
I am not a professional in the field of information security, my area of interest is high-performance computing systems. I came to the topic of information security quite by accident, and this is what will be discussed further. I think this non-fictional story will highlight the problems associated with virtualization hardware much better than a dry statement of facts. Even before the official announcement of new Intel processors with support for hardware virtualization (in early 2007), I planned to use these chips to create a single computing system based on several servers, which would become a single computing installation with an SMP architecture for the OS and application programs. To do this, it was necessary to write a compact hypervisor with non-standard functionality, main feature which would not be the division of the resources of a single computing installation between different operating systems, but, on the contrary, the union of the resources of several computers into a single complex, which would be controlled by one OS. At the same time, the OS should not have even guessed that it was not dealing with unified system but with multiple servers. Virtualization equipment provided such an opportunity, although it was not originally intended for solving such problems. Actually, a system in which virtualization hardware would be used for high-performance computing has not yet been created, and at that time I was generally a pioneer in this area. The hypervisor for this task, of course, was written from scratch. It was fundamentally important to run the OS already on a virtualized platform, so that from the first commands of the OS loader everything would work in a virtual environment. To do this, we had to virtualize the real model and all modes of processor operation and start virtualization immediately after platform initialization before loading the OS. Since the virtualization system for this purpose turned out to be non-standard and looked like a completely autonomous compact software module (code size no more than 40–60 KB), the language somehow did not dare to call it a hypervisor, and I began to use the term "hyperdriver", since it is more accurate conveyed the essence of the functional purpose of the system. There was no serial equipment with virtualization hardware at that time, however, thanks to cooperation with the Kraftway company, I had access to pre-series samples of processors and motherboards with virtualization support that had not yet been officially released (the so-called samples that Intel kindly provides to its business partners). Therefore, the work began to boil on this "sample" equipment. The layout was assembled, the hyperdriver was written, everything worked as intended. I must say that at that time the virtualization equipment was very "raw", which is why it repeatedly refused to work as written in the documentation. I had to deal with literally every assembler instruction, and write the instructions for the virtualization equipment in machine codes, because then there were no compilers supporting virtualization instructions. I was proud of the results, I felt almost like the master of virtual worlds ... but my euphoria did not last long, only a month. By that time, I had already assembled a layout based on servers with virtualization equipment, the first serial samples of which had just appeared at that time, but the layout did not work. I began to understand and realized that my system hangs when executing hardware virtualization commands. It seemed that they either did not work at all, or worked somehow non-standard. The freeze occurred only while the virtualization hardware was running in real mode, but if my system was started from protected mode after the OS loaded, then everything was fine. Professionals know that in the first revisions, the Intel virtualization hardware did not support the processor in real mode. This required extra layer large enough to emulate virtual x86. Since the hyperdriver was running before the operating system loaded, so that it could fully believe in the new virtual configuration, a small piece of OS boot code was executed in the real mode of the processor. The system was dying just on the emulation handlers real mode in the hyperdriver. At first I thought that somewhere I made a mistake, I didn’t understand something, I forgot about something. I checked everything to the last bit in my code, did not find any errors and began to sin not on myself, but on colleagues from behind a hillock. The first step was to replace the processors, but it did not help. On motherboards at that time, virtualization hardware was only in the BIOS, where it was initialized when the server was turned on, so I started comparing BIOSes on motherboards (same motherboards with samples) - everything matched up to the byte and number of the BIOS itself. I fell into a stupor and, no longer knowing what to do, applied last resort- "poke method". What I just didn’t do, no longer thinking, but simply combining, and in the end stupidly downloaded the bios from the official Intel website and rewrote them again into motherboards, after which everything worked ... There was no limit to my surprise: the BIOS number was the same , the bios images matched byte by byte, but for some reason serial motherboards only worked when I filled them with the same bios taken from the Intel site. So, the reason is still in the motherboards? But their only difference was in the labeling: Assembled Canada was written on the samples, and Assembled China on the production boards. It became clear that boards from China contain additional software modules flashed in the BIOS, but these modules were not seen by standard analysis programs. They, apparently, also worked with virtualization equipment and, accordingly, had the opportunity to hide the true contents of the BIOS. It also became clear why my hyperdriver freezes on these Chinese boards: two software systems simultaneously worked with the same virtualization equipment, which did not allow sharing their resources. I wanted to deal with this malicious bios, and without any ulterior motives about "bookmarks", "backdoors", "undocumented features", it was just an academic interest, and nothing more. I must say that in parallel with the introduction of virtualization hardware, Intel radically updated the chipset. This chipset, which received the number 5000x, is still available in several modifications. The south bridge of this chipset, 631xESB/632xESB I/O Controller Hub, to which flash microcircuits with BIOS are connected, has been produced almost unchanged since 2007 and is used as the base chip for almost all servers in a two-socket version. I downloaded the southbridge datasheet, read the description, and was just blown away. It turns out that three flash memory chips are connected to this new south bridge: the first is a standard BIOS, the second is dedicated to the network controller processor programs, and the third is intended for the naval unit integrated into the south bridge. The system management unit (SMB) is a means of remote control and monitoring of a computer installation. It is indispensable for large server rooms, where, due to noise, temperature and drafts, it is simply impossible to stay for a long time. The fact that naval units have their own processor and, accordingly, flash memory for its programs, of course, is not new, but until now such a processor and memory were placed on a separate board that was connected to the motherboard: if you want - put it, if you don’t want it - don't put. Now Intel has implemented these components in the south bridge, moreover, connected this unit to the system bus and did not use a dedicated network channel (as provided by the IPMI standard describing the functions of the BMC unit) for the operation of the service network, but tunneled all service network traffic to the main network adapters. Further, I learned from the documentation that the programs on the flash chip of the naval unit are encrypted, and a special hardware cryptographic module, also integrated into the south bridge, is used to unpack them. I have not come across such blocks of the Navy before. In order not to be unfounded, I give an excerpt from the documentation for this south bridge:
- ARC4 processor working at 62.5 MHz speed.
- Interface to both LAN ports of Intel® 631xESB/632xESB I/O Controller Hub allowing direct connection to the net and access to all LAN registers.
- Cryptographic module supporting AES and RC4 encryption algorithms and SHA1 and MD5 authentication algorithms.
- Secured mechanism for loadable Regulated FW.
- In new serial server rooms Intel boards based on the 5000 chipset, there are programs flashed into the flash memory of the BMC unit and executed on the central processor, and these programs work using virtualization equipment CPU.
- Flash memory images from the official Intel website do not contain such software modules, therefore, software modules that interfere with me were illegally flashed into motherboards at the production stage.
- The flash memory of the VMS block contains encrypted program modules that cannot be assembled and uploaded to the flash memory without knowing the encryption keys, therefore, the one who inserted these illegal program modules knew the encryption keys, that is, he actually had access to secret information.
![](https://i0.wp.com/xakep.ru/wp-content/uploads/post/58104/3.png)
![](https://i0.wp.com/xakep.ru/wp-content/uploads/post/58104/4.png)
Concern that with a sufficient technical level of the enemy, there is a danger of him performing a covert modification of any chip. The modified chip will work in critical nodes, and the introduced "Trojan horse" or "hardware bookmark" will go unnoticed, undermining the country's defense capability at the most fundamental level. For a long time such a threat remained hypothetical, but an international team of researchers was recently able to implement it at the physical level.
Georg T. Becker of the University of Massachusetts, together with colleagues from Switzerland and Germany, created two versions of a “hardware-level Trojan” that disrupts the operation of the (pseudo) random number generator (PRNG) in the cryptographic block of Intel Ivy architecture processors as part of a proof of concept Bridge. The cryptographic keys created using the modified PRNG for any encryption system will be easily predictable.
The presence of a hardware tab is in no way determined either by built-in tests specially designed for this, or by external examination of the processor. How could this happen? To answer this question, it is necessary to return to the history of the appearance of a hardware PRNG and familiarize yourself with basic principles his works.
When creating cryptographic systems, it is required to eliminate the possibility of quick selection of keys. Their length and degree of unpredictability directly affect the number of options that the attacking side would have to try. The length can be set directly, but it is much more difficult to achieve the uniqueness of key variants and their equal probability. To do this, random numbers are used during key generation.
At present, it is generally accepted that due to only software algorithms it is impossible to obtain a truly random stream of numbers with their uniform chaotic distribution over the entire specified set. They will always have a high frequency of occurrence in some parts of the range and remain predictable to some extent. Therefore, most of the number generators used in practice should be taken as pseudo-random. They are rarely secure enough in a cryptographic sense.
To reduce the effect of predictability, any number generator needs a reliable source of random seed - random seed. Usually, the results of measurements of some chaotic physical processes are used as it. For example, fluctuations in the intensity of light vibrations or registration of radio frequency noise. It would be technically convenient to use such an element of randomness (and the entire hardware PRNG) in a compact version, and ideally, make it built-in.
Intel has been building (pseudo)random number generators into its chips since the late nineties. Previously, their nature was analog. Random values at the output were obtained due to the influence of hard-to-predict physical processes - thermal noise and electromagnetic interference. Analog oscillators were relatively easy to implement as separate blocks, but difficult to integrate into new circuits. As the process got smaller, new and lengthy calibration steps were required. In addition, a regular decrease in the supply voltage worsened the signal-to-noise ratio in such systems. PRNGs worked constantly and consumed a significant amount of energy, and the speed of their work left much to be desired. These shortcomings have limited the possible areas of application.
The idea of a (pseudo)random number generator with an all-digital nature seemed strange, if not absurd, for a long time. After all, any state digital circuit always rigidly determined and predictable. How to introduce the necessary element of randomness into it if there are no analog components?
Attempts to get the desired chaos based only on digital elements have been made by Intel engineers since 2008 and were crowned with success after a couple of years of research. The work was presented in 2010 at the VLSI Summer Symposium in Honolulu and made a small revolution in modern cryptography. For the first time, a fully digital, fast, and energy-efficient PRNG has been implemented in mass-produced general-purpose processors.
Its first working title was Bull Mountain. Then it was renamed to Secure Key. This cryptographic block consists of three basic modules. The first generates a stream of random bits at a relatively slow rate of 3 Gbps. The second evaluates their variance and combines them into blocks of 256 bits, which are used as sources of random seeding. After a series of mathematical procedures in the third block with more high speed a 128-bit stream of random numbers is generated. Based on them, with new instruction RdRand, if necessary, random numbers of the required length are created and placed in a specially allocated register: 16, 32 or 64 bits, which are eventually transferred to the program that requested them.
Errors in (pseudo)random number generators and their malicious modifications cause a loss of confidence in popular cryptographic products and the very procedure for their certification.
Due to the exceptional importance of PRNG for any cryptographic system, tests were built into Secure Key to check the quality of generated random numbers, and leading expert groups were involved in certification. The entire block meets the criteria of ANSI X9.82 and NIST SP 800-90. In addition, it is Level 2 certified to NIST FIPS 140-2.
Until now, most of the work on hardware Trojans has been hypothetical. The researchers proposed additional designs of small logical circuits, which should somehow be added to existing chips. For example, Samuel Talmadge King and co-authors presented at the LEET-08 conference a variant of such a hardware Trojan for the central processor, which would provide complete control over the system to a remote attacker. By simply sending a UDP packet configured in a certain way, one could make any changes on such a computer and gain unlimited access to its memory. However, additional logical circuits are relatively easy to identify under microscopy, not to mention specialized methods for searching for such modifications. Becker's group went the other way:
Instead of adding additional circuitry to the chip, we implemented our hardware-level tabs by simply changing the operation of some of the microtransistors already on it. After a number of attempts, we managed to selectively change the polarity of the dopant and introduce the desired modifications into the operation of the entire cryptographic unit. Therefore, our family of Trojans proved to be resistant to most detection methods, including scanning microscopy and comparison with reference chips.”
As a result of the work done, instead of unique numbers with a length of 128 bits, the third Secure Key block began to accumulate sequences in which only 32 bits differed. The cryptographic keys created on the basis of such pseudo-random numbers are highly predictable and can be cracked within minutes on a typical home computer.
The selective change in electrical conductivity underlying the hardware tab was implemented in two versions:
- digital post-processing of signals from Intel Secure Key;
- use on a side channel using the table bit substitution method (Substitution-box).
The latter method is more versatile and can be applied with minor modifications to other chips.
The ability to use the built-in PRNG through the RdRand instruction first appeared in Intel processors Ivy Bridge architecture. Intel has written detailed manuals for programmers. They describe methods for the optimal implementation of cryptographic algorithms and provide a link to a description of the principles of Secure Key operation. For a long time, the efforts of security experts have been focused on finding vulnerabilities in the software part. Perhaps for the first time, hidden intervention at the hardware level turned out to be a much more dangerous and quite feasible technology in practice.