WSMT

WSMT

横行无忌这么多年,SMM终于被微软压制了。MS在2016年提出VBS Virtualization-based security,VBS使用windows的管理软件、系统软件与CPU的虚拟化技术相配合,建立起一个安全的环境供给SMM这种不听话的功能使用。
在VBS出现之前,SMM是一匹脱缰的野马,谁也不知道能捅出什么篓子,它能读取和修改所有的内存和资源,几乎想干什么就干什么。在VBS出现后,SMM要听VBS的话,运行在SMM里的固件必须要获取VBS的信任,而那些以前与SMM处在同一个级别(CPL0)的操作系统组件现在趾高气昂了,不用受这种窝囊气。
对Windows知之甚少,不深入研究VBS,主要看一下WSMT。
因为SMM对OS不透明,OS没法直接去管理SMM,需要固件自砍一刀,自己对SMM进行限制,所以微软定义了WSMT。 WSMT全称Windows SMM Security Mitigations Table,使用WSMT这个功能的时候,BIOS(原谅我,还是BIOS看起来比较顺眼…)要在ACPI namespace里创建一个静态的WSMT table。系统启动时,在运行ACPI解析器和_OSI method之前,Windows会先读WSMT并使用里面的Protection flags对SMM进行限制。不过OSPM本身还是不知道这个功能是否是正常的,这个功能完全依靠BIOS来完成的。
来看一下WSMT的protection flags,Windows系统根据SMM Protection 的标志位来选择打开, 关闭或取消某些安全功能:
Bit0
SMM要验证输入和输出的buffers是否都在某个特定的内存范围里(这个范围定义在BIOS里的SMM communication ACPI Table里)
Bit1
SMM要验证所有的输入和输出指针是否在某个特定的内存区域内的地址范围(同上)
Bit2
在ExitBootServices()之后,firmware不允许任何软件来配置系统资源,包含IOMMU’s, 中断控制器,PCI配置空间,FACS,memory layout和ACPI fixed tables里面报告的所有的registers。

未完待续…

附: UEFI在ver2.6里废弃了SMM Communication ACPI Table,不知道现在内存地址放在哪里,望知道的大神帮忙解答,感谢!

BIOS-UEFI安全培训包 Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives This repository contains materials for a hands-on training Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives A variety of attacks targeting system firmware have been discussed publicly, drawing attention to the pre-boot and firmware components of the platform such as BIOS and SMM, OS loaders and secure booting. This training will detail and organize objectives, attack vectors, vulnerabilities and exploits against various types of system firmware such as legacy BIOS, SMI handlers and UEFI based firmware, mitigations as well as tools and methods available to analyze security of such firmware components. It will also detail protections available in hardware and in firmware such as Secure Boot implemented by modern operating systems against bootkits. The training includes theoretical material describing a structured approach to system firmware security analysis and mitigations as well as many hands-on exercises to test system firmware for vulnerabilities. After the training you should have basic understanding of platform hardware components and various types of system firmware, security objectives and attacks against system firmware, mitigations available in hardware and firmware. You should be able to apply this knowledge in practice to identify vulnerabilities in BIOS and perform forensic analysis of the firmware. Materials Module 0 Introduction to Firmware Security Module 1 BIOS and UEFI Firmware Fundamentals Module 2 Bootkits and UEFI Secure Boot Module 3 Hands-On Platform Hardware and Firmware Module 4 System Firmware Attack Vectors Module 5 Hands-On EFI Environment Module 6 Mitigations Module 7 System Firmware Forensics Miscellaneous Materials
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值