News Posts matching #fTPM

Return to Keyword Browsing

IBASE Announces IB961 5G-ready 3.5" SBC for Embedded Computing Powered by 13th Gen Intel Core Processors

IBASE Technology Inc. (TPEx: 8050), a pioneering force in embedded computing solutions, proudly presents the IB961 3.5" Single Board Computer (SBC) engineered for peak performance, extensive connectivity, and unmatched versatility. Harnessing the prowess of 13th Gen Intel Core processors, including the i7-1370PE, i5-1340PE, i5-1335UE, and i3-1320PE, the IB961 delivers exceptional computing capabilities across diverse applications. These processors advance performance hybrid architecture with up to 6 Performance-cores (P-core) and up to 8 Efficient-cores (E-core), ensuring unparalleled power for memory-intensive tasks.

This compact SBC offers a rich array of connectivity options, including M.2 (M-Key, E-Key, B-Key) mini type slots, and USB 3.2 ports, enabling 5G communications and ensuring seamless integration with peripherals. Dual Intel LAN support guarantees reliable, high-speed network connectivity. Integrated graphics from 13th Gen Intel Core mobile processors provide stunning visuals through 2x DisplayPort (1.2), eDP, and LVDS outputs. The IB961 signifies a leap forward in embedded computing technology, empowering businesses to enhance efficiency and adaptability across diverse industrial applications.

IBASE Launches Low-Power IB838 Single Board Computer Powered by Intel Core i3 N-series (Alder Lake-N) Processor

IBASE Technology Inc. (TPEx: 8050), a renowned provider in the design and manufacturing of embedded computing solutions, rolls out the low-power IB838 3.5" single board computer powered by Intel Core i3 N-series (formerly Alder Lake-N) processor. Combining robust computing performance with advanced features, it is positioned to meet diverse needs across multiple industries, including industrial automation and control, retail displays, transportation, and automotive applications.

Fortified with intelligent power handling and a 9 V~36 V DC input range, the IB838 ensures reliability and consistent operations in transportation applications that may encounter variable power conditions. Versatile connectivity makes it ideal for automation processes and data acquisition systems. The SBC offers Type-C, DP++, and eDP or LVDS display options, along with a rich set of I/O interfaces, including two Intel PCI-E 2.5G LAN ports, two USB 2.0 ports, and four USB 3.2 ports (1x Type-C + 3x Type-A).

IBASE Versatile IB837 3.5-inch SBC Supports Intel Celeron N & J Series Processors

IBASE Technology Inc. (TPEx: 8050), a leading provider of embedded computing solutions, introduces the IB837 3.5" single board computer that is designed for a wide range of IoT applications, including industrial automation, smart retail, healthcare, smart city and edge AI solutions, combining powerful processing capabilities with extensive connectivity options.

At the heart of the IB837 is the onboard Intel Celeron N & J series (formerly Elkhart Lake) processor, offering a good balance of performance and power efficiency. With support for up to 16 GB of DDR4-3200 SO-DIMM memory, the SBC ensures smooth multitasking and efficient operation, delivering exceptional performance while consuming minimal power for applications requiring a compact form factor.

AMD faulTPM Exploit Targets Zen 2 and Zen 3 Processors

Researchers at the Technical University of Berlin have published a paper called "faulTPM: Exposing AMD fTPMs' Deepest Secrets," highlighting AMD's firmware-based Trusted Platform Module (TPM) is susceptible to the new exploit targeting Zen 2 and Zen 3 processors. The faulTPM attack against AMD fTPMs involves utilizing the AMD secure processor's (SP) vulnerability to voltage fault injection attacks. This allows the attacker to extract a chip-unique secret from the targeted CPU, which is then used to derive the storage and integrity keys protecting the fTPM's non-volatile data stored on the BIOS flash chip. The attack consists of a manual parameter determination phase and a brute-force search for a final delay parameter. The first step requires around 30 minutes of manual attention, but it can potentially be automated. The second phase consists of repeated attack attempts to search for the last-to-be-determined parameter and execute the attack's payload.

Once these steps are completed, the attacker can extract any cryptographic material stored or sealed by the fTPM regardless of authentication mechanisms, such as Platform Configuration Register (PCR) validation or passphrases with anti-hammering protection. Interestingly, BitLocker uses TPM as a security measure, and faulTPM compromises the system. Researchers suggested that Zen 2 and Zen 3 CPUs are vulnerable, while Zen 4 wasn't mentioned. The attack requires several hours of physical access, so remote vulnerabilities are not a problem. Below, you can see the $200 system used for this attack and an illustration of the physical connections necessary.

Return to Keyword Browsing
May 16th, 2024 13:47 EDT change timezone

New Forum Posts

Popular Reviews

Controversial News Posts