YoVDO

Intel VISA - Through the Rabbit Hole

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Hardware Security Courses

Course Description

Overview

Explore the hidden architecture of Intel's Platform Controller Hub (PCH) in this Black Hat conference talk. Delve into the world of Intel VISA (Visualization of Internal Signals Architecture) and discover dozens of invisible devices capable of accessing critical data within the chip. Learn how to read signals from PCH internal buses, including IOSF Primary and Side Band buses, and Intel ME Front Side Bus. Gain insights into security-sensitive internal devices and their potential implications. Follow the presenters' journey through Intel's debugging tools evolution, Intel DCI, PCH/SOC hardware tracing, and the intricacies of Intel Trace Hub software. Examine the Intel VISA schematic, registers controller, multiplexers, and groups. Understand ODLA tracing step-by-step and explore the On-Chip System Fabric. Investigate IOSF Side Band Bus functionality and its implementation in LBG Chipset. Uncover the secrets of DAL encrypted XML files and hardware security levels. Learn about DFx Fuses, unfused keys, and unlock tokens. Dive into the world of JTAG password life cycles and fault injection techniques. This comprehensive talk provides a deep dive into Intel's internal architecture, offering valuable insights for security researchers and hardware enthusiasts alike.

Syllabus

Intro
black hat Agenda
black hat Intel Debugging Tools: Evolution
black hat Intel DCI
black hat Intel PCH/SOC Hardware Tracing
blackhat Intel Trace Hub Software
blackhat Intel VISA Schematic
black hat Intel VISA Registers Controller (VRC)
blackhat Multiplexers & Groups
bllokhat Intel VISA Control Registers
black hat Intel VISA Multiplexer
black hat ODLA Tracing: Step by Step
blackhat Intel On-Chip System Fabric
blackhat IOSF Side Band Bus
black hat IOSF example for LBG Chipset
black hat DAL: Encrypted XML Files
blackhat Hardware Security Levels
black hat Intel VISA & DFx Fuses
black hat Unfused Key
black hat Unlock Token
blok hat Unlock: Traffic Light Passwords
blackhat JTAG Password Live Cycle
blackhat Indirect Evidence
blok hat Fault Injection


Taught by

Black Hat

Related Courses

Hardware Security
University of Maryland, College Park via Coursera
Information Security- II
Indian Institute of Technology Madras via Swayam
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Cybersecurity
University of Maryland, College Park via Coursera
Learning Mobile Device Security
LinkedIn Learning