The AMD Platform Security Processor (PSP) is a dedicated ARM CPU inside your AMD processor and runs undocumented, proprietary firmware provided by AMD.
It is a processor inside your processor that you don’t control. It is essential for system startup. In fact, in runs before the main processor is even started and is responsible for bootstrapping all other components.
This talk presents our efforts investigating the PSP internals and functionality and how you can better understand it.
Our talk is divided into three parts:
The first part covers the firmware structure of the PSP and how we analyzed this proprietary firmware. We will demonstrate how to extract and replace individual firmware components of the PSP and how to observe the PSP during boot.
The second part covers the functionality of the PSP and how it interacts with other components of the x86 CPU like the DRAM controller or System Management Unit (SMU). We will present our method to gain access to the, otherwise hidden, debug output.
The talk concludes with a security analysis of the PSP firmware.
We will demonstrate how to provide custom firmare to run on the PSP and introduce our toolchain that helps building custom applications for the PSP.
This talk documents the PSP firmware’s proprietary filesystem and provides insights into reverse-engineering such a deeply embedded system. It further sheds light on how we might regain trust in AMD CPUs despite the delicate nature of the PSP.
Robert Buhren Alexander Eichner Christian Werling
- Glühbirnen hacken! - 19.09.2021
- Closing Datenspuren 2021 - 19.09.2021
- #DiVOC R2R – Hydrogen beyond the hype – deutsche Übersetzung - 16.04.2021
- #DiVOC R2R – Hydrogen beyond the hype - 16.04.2021
- #DiVOC R2R – failed: [Inklusion] - 15.04.2021