[399] Its my box: how the hardware and software traps in the Xbox were beaten and Linux installed

Speakers
Michael Steil
Andy Green
Milosch Meriac
Language english
Lecture Documentation
MPEG-4 Recording
MP3 Recording
Room Saal 2
Time Day 2, 16:00h
Duration 2 hours
Links
[1] http://xbox-linux.sourceforge.net/
[2] http://xbox-linux.sf.net/
[3] XBox Hacker
[4] http://news.zdnet.co.uk/story/0,,t269-s2123851,00.html
[5] http://www.busybox.net/
[6] http://www.uclibc.org/
[7] http://www.acme.com/software/thttpd/
[8] http://www.pengutronix.de/software/utelnetd_de.html
[9] http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
[10] http://www.epic.org/privacy/consumer/microsoft/palladium.html

Description

Microsoft went to some lengths to ensure that only approved code could be run on their 'Microsoft-only' PC, the Xbox. The talk gives an overview of the Xbox hardware components, and a detailed background into the Xbox 'security' architecture of the Xbox, and how the chain of trust was defeated using custom hardware. Also covered in detail is Microsoft's recent changes to the boot crypto using Palladium-style hash methods, and how this was broken by our team. We will also talk briefly about TCPA/Palladium, the implications and its possible future as well as the process of porting Linux.

Archived page - Impressum/Datenschutz