Trusted Platform Modules constitute an integral building block of modern security features. Moreover, as Windows 11 made a TPM 2.0 mandatory, they are subject to an ever-increasing academic challenge. While discrete TPMs - as found in higher-end systems - have been susceptible to attacks on their exposed communication interface, more common firmware TPMs (fTPMs) are immune to this attack vector as they do not communicate with the CPU via an exposed bus. In this paper, we analyze a new class of attacks against fTPMs: Attacking their Trusted Execution Environment can lead to a full TPM state compromise. We experimentally verify this attack by compromising the AMD Secure Processor, which constitutes the TEE for AMD's fTPMs. In contrast to previous dTPM sniffing attacks, this vulnerability exposes the complete internal TPM state of the fTPM. It allows us to extract any cryptographic material stored or sealed by the fTPM regardless of authentication mechanisms such as Platform Configuration Register validation or passphrases with anti-hammering protection. First, we demonstrate the impact of our findings by - to the best of our knowledge - enabling the first attack against Full Disk Encryption solutions backed by an fTPM. Furthermore, we lay out how any application relying solely on the security properties of the TPM - like Bitlocker's TPM- only protector - can be defeated by an attacker with 2-3 hours of physical access to the target device. Lastly, we analyze the impact of our attack on FDE solutions protected by a TPM and PIN strategy. While a naive implementation also leaves the disk completely unprotected, we find that BitLocker's FDE implementation withholds some protection depending on the complexity of the used PIN. Our results show that when an fTPM's internal state is compromised, a TPM and PIN strategy for FDE is less secure than TPM-less protection with a reasonable passphrase.
翻译:可信平台模块是现代安全功能的一个重要构建块。而且,随着 Windows 11 强制要求使用TPM 2.0,它们受到越来越严峻的学术挑战。虽然高端系统中的离散TPM容易受到暴露的通讯接口攻击,但更常见的固件 TPM(fTPM)免疫于此攻击向量,因为它们不通过外部总线与CPU通讯。在本文中,我们分析了一类新的针对fTPM的攻击:攻击它们的可信执行环境可能会导致完整的TPM状态被妥协。我们通过危害AMD Secure Processor来验证该攻击,该处理器是AMD fTPM的TEE。与先前的dTPM网络嗅探攻击不同,此漏洞可以披露fTPM的完整内部TPM状态。它允许我们提取由fTPM存储或密封的任何加密材料,无论身份认证机制如何,例如Platform Configuration Register验证或带有反锤击保护的密码口令。首先,我们通过实现对于全磁盘加密解决方案的攻击展现了我们的研究成果 - 据我们所知,这是首次攻击支持fTPM的解决方案。此外,我们介绍了任何仅依赖TPM安全性属性的应用程序 - 如 Bitlocker 的 TPM-only protector - 如何可以被攻击者在目标设备物理访问 2-3 小时内击败。最后,我们分析了我们的攻击对于使用 TPM 和 PIN 策略进行FDE保护的FDE解决方案的影响。虽然简单的实现会使磁盘完全没有保护,但我们发现,根据所用PIN的复杂程度,BitLocker的FDE实现保留了一些保护。我们的结果表明,当fTPM的内部状态被妥协时,基于TPM和PIN策略进行FDE保护比使用合理的口令进行的TPM-less保护不那么安全。