Speakers |
|
Language |
english |
Lecture Documentation |
|
Room |
Saal 2 |
Time |
Day 2, 16:00h |
Duration |
2 hours |
Links |
|
Microsoft went to some lengths to ensure that only approved code could be run on their 'Microsoft-only' PC, the Xbox. The
talk gives an overview of the Xbox hardware components, and a detailed background into the Xbox 'security' architecture
of the Xbox, and how the chain of trust was defeated using custom hardware. Also covered in detail is Microsoft's recent
changes to the boot crypto using Palladium-style hash methods, and how this was broken by our team. We will also talk briefly
about TCPA/Palladium, the implications and its possible future as well as the process of porting Linux.