[Arm-netbook] ARM's OOB para-virtualization & FreeZone in A10?

Gordan Bobic gordan at bobich.net
Tue Jul 10 19:45:57 BST 2012


On 07/10/2012 07:17 PM, freebirds at fastmail.fm wrote:

> Gordon Bobic, I appreciate your giving more advice on AV and using AV in
> Firefox and Thunderbird. Yet, all of you are ignoring that AV does not
> scan BIOS, HPA of hard drives and graphic cards.

/me bashes head against his desk until it is no longer dulling the pain.

Do you have any idea how hard it is to actually modify the BIOS without 
rendering the machine completely unbootable? I do not recall off the top 
of my head of a single instance where some well known, widely propagated 
malware infected the machine's BIOS. Flashing the wrong BIOS, even if it 
is for a similar motherboard with the same chipset, will typically brick 
it. Having malware that re-flashes the BIOS in a way that still has the 
BIOS operational while having a malicious component in it would be way 
too difficult expensive to be worthwhile - and even then, that BIOS 
infecting payload would only work on a very specific motherboard - you'd 
have to do the work again for any other motherboard. Given the sheer 
range of motherboards on the market today, and the rate at which the new 
ones are appearing, this just isn't a feasible thing to consider.

Disk HPA is inaccessible from the userspace. It is inaccessible in just 
about every way by everything, until you re-configure the disk's 
firmware setting to expose the area. Suffice to say, your machine 
couldn't actually run anything from the HPA because it is inaccessible, 
so having malware within the HPA is going to be pretty damn ineffective 
as far as attack vectors go. You could have 2-piece malware, one part 
that handles the HPA re-programming and loading the stage 2, but then 
the first stage of it would be detectable by normal means. In practice 
it is far easier for malware to encrypt itself to hide itself, the way 
graphics drivers from Nvidia are encrypted. Not that this is particulary 
effective since there has to be a part that is executable to handle the 
decryption, and that part will be detectable. Again, not an issue or 
worth worrying about.

Similar for the graphics cards. While you could put malware into the GPU 
BIOS, this comes with the same difficulties as having malware in the 
motherboard BIOS.

And even if these as-good-as-impossible difficulties were overcome 
because some entity with near unlimited resources REALLY has it in for 
you, they would still have to plant the malware onto your machine 
somehow in the first place, which should be at the very least extremely 
difficult if you have done your homework right.

> I need to read articles
> on fingerprinting to ascertain whether having numerous plugins and
> addons in Firefox will enable crackers from fingerprinting my browser.

Only if you go and visit their website. And the chances are that there 
are at least a few thousand people around the world with the same 
combination of plugins (e.g. ABP, FlashBlock and NoScript).

> Also, if the AV add-on for Firefox connects to the AV's IP address every
> time I use the browser, that would be leaving a paper trail.

AV on your machine will call home to check for signature file updates 
periodically (between once/hour and once/day, typically). There is no 
real way around that if you want your protection to be up to date. Every 
time you use your browser your ISP keeps a log trail of everything you 
did anyway. Even if you are using something like TOR, they will still at 
the very least have the ability to tell that you used TOR even if they 
cannot see exactly what for.

You need to ask yourself what exactly are your requirements. What attack 
vectors are you aiming to protect yourself against? What level of 
monitoring do you need to circumvent, over and above the inevitable and 
extensive level that can be trivially performed by your ISP every time 
your computer goes on the internet. If that dose of reality is 
unacceptable for you, then you shouldn't be using the internet at all. 
Or phones for that matter (because voice analysis could be used to 
identify people). Or walking down to the shops (facial recognition from 
TV images). So before you start worrying about surveilance and being 
tracked, you need to establish what is acceptable for your use-case and 
what isn't. And bear in mind that the chances are that no matter how 
good you are, you will miss at least one CCTV camera somewhere on your 
travels within minutes.

How deep is your rabbit hole?

Gordan



More information about the arm-netbook mailing list