How to enable JTAG debugging via USB

    image

    At the end of December 2016, we published on Habré a material on the presentation of Positive Technologies experts at the Chaos Communication Congress (33C3) in Hamburg. Maxim Goryachy and Mark Ermolov talked about how modern Intel processors allow you to use the JTAG debugging interface through the USB 3.0 port available on many platforms to gain complete control over the system.

    Starting with the Skylake family of processors launched in 2015, Intel has introduced Direct Connect Interface (DCI) technology, which provides access to JTAG via the popular USB 3.0 port. At the same time, no software or hardware agents are required on the target computer - it is only necessary for the DCI interface to be activated. Thus, the opportunity to use the capabilities of JTAG on equipment that is commercially available has appeared among ordinary developers.

    Here you can see slides of the performance of researchers at 33C3.

    The report of Positive Technologies experts caused a serious resonance - the leading Russian and foreign ones wrote about possible attacks on Intel processors via USBMEDIA. Now the authors of the study are ready to answer questions and talk in more detail about the internal structure of the JTAG debugging mechanism during their free webinar .

    In particular, the following important points will be disclosed:

    1. On which ports DCI functionality is available;
    2. How to bypass protection through MSR IA32_DEBUG_INTERFACE

    The webinar " How to enable JTAG debugging via USB " will be held on Thursday, February 9 at 14:00 . Its presenters are Maxim Goryachiy and Mark Ermolov, Senior Programmers of the Virtualization Technologies Department. Participation in the webinar is free, registration is required at the link: www.ptsecurity.com/ru-ru/research/webinar/161502/

    UPD : Published webinar video:

    Also popular now: