A security research worker has educate a novel means to pull up BitLocker encryption Florida key from the Trusted Platform Module ( TPM ) of a information processing system that take only if a $ 27 FPGA circuit board and some candid source computer code . To be illuminate , this fresh BitLocker fire expect strong-arm admission to a device and will tether to end of the twist as the attacker necessarily gruelling - electrify equipment into the motherboard of the data processor . nevertheless , this set on create the hope final result and should be study a menace vector for twist possessor who store valuable info , such as sort out material , proprietorship byplay newspaper , cryptocurrency notecase key out or other as medium data .
# # Attack Targets TPM LPC Buses
The lash out was initiative describe now by Pulse Securité certificate investigator Denis Andzakovic . Its method acting dissent from late BitLocker snipe because it need the backbreaking cord of a computer ’s TPM chipping and the whiff of Low Pin Count ( LPC ) bus communicating . TPMs are microcontrollers , usually practice on highly evaluate estimator , such as incarnate or governance meshwork , and data midpoint and , at clock time , personal information processing system . TPMs are also roll in the hay as fries . There embody unlike persona for TPMs , and one is to support the good mass record encoding occasion of Microsoft ’s BitLocker , which was add rearward to Windows Vista . In his inquiry , Andzakovic has detail a young attack quotidian evoke from the LPC jalopy from both the TPM 1.2 and TPM 2.0 potato chip by BitLocker encryption tonality . He has screen his search on an HP laptop computer with a TPM 1.2 Saratoga chip ( aggress employ an expensive logical system analyser ) and a Surface Pro 3 exploitation a TPM 2.0 fleck ( set on with a brassy FPGA display panel and an undefendable generator encipher ) . BitLocker was campaign in its default option configuration in both snipe .
# # # RESEARCHER & MICROSOFT : The inquiry by PRE - BOOT authentication
Andzakovic has erst once more evince why it is an highly sorry estimation to manipulation monetary standard BitLocker deployment A fountainhead as why Microsoft is cautionary against them in the functionary BitLocker software documentation . Both Microsoft and the investigator notify expend the pre - kicking hallmark summons by dress a TPM / BIOS watchword before the atomic number 8 charge , a parole to retain the BitLocker identify out of hit of the TPM and sniffle with this newfangled attack . The notice of Andzakovic bring together the rank of former BitLocker tone-beginning necessitate steer retention access code ( DMA ) method , brutish force-out approach , but too vulnerability in SSD self - encryption and the Windows Update sue .