Difference between revisions of "Resources"

From ME
Jump to: navigation, search
(External resources)
 
Line 19: Line 19:
 
* See /drivers/misc/mei in [http://www.kernel.org linux kernel].
 
* See /drivers/misc/mei in [http://www.kernel.org linux kernel].
 
* [https://docs.google.com/viewer?url=http%3A%2F%2Fwww.stewin.org%2Fslides%2Fpstewin-SPRING6-EvaluatingRing-3Rootkits.pdf Evaluating Ring -3 Rootkits]
 
* [https://docs.google.com/viewer?url=http%3A%2F%2Fwww.stewin.org%2Fslides%2Fpstewin-SPRING6-EvaluatingRing-3Rootkits.pdf Evaluating Ring -3 Rootkits]
 +
* [http://web.it.kth.se/~maguire/DEGREE-PROJECT-REPORTS/100402-Vassilios_Ververis-with-cover.pdf Evaluating the security of Intel AMT by Vassilios Ververis]

Latest revision as of 08:47, 27 June 2013

This page contains a collection of resources regarding ME.


  • File:Attacking Intel BIOS.pdf - Rafal Wojtczuk, Alexander Tereshkin, Attacking Intel BIOS, Black Hat USA, July 30 2009, Las Vegas, NV
  • File:DeepWatch.pdf - Yuriy Bulygin, David Samyde, Chipset Based Detection and Removal of Virtualization Malware a.k.a. DeepWatch, Black Hat USA, 2008
  • File:Rootkit in your laptop.pdf - Igor Skochinsky, Rootkit in your laptop: Hidden code in your chipset and how to discover what exactly it does, Breakpoint 2012, Melbourne
  • File:Ring -3 Rootkits.pdf - Alexander Tereshkin, Rafal Wojtczuk, Introducing Ring -3 Rootkits, Black Hat USA, Las Vegas, NV, July 29, 2009
  • File:Quest To The Core.pdf - Joanna Rutkowska, A Quest To The Core: Thoughts on present and future attacks on system core technologies, Intel Security Summit, Hillsboro, OR, September 15-18, 2009
  • File:Csk lacon12 intel amt.pdf - "csk", Intel AMT/ME Meet Intel’s hardware backdoor

External resources