Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
AMD Platform Security Processor
Trusted execution environment subsystem

The AMD Platform Security Processor (PSP), officially known as AMD Secure Technology, is a trusted execution environment subsystem incorporated since about 2013 into AMD microprocessors. According to an AMD developer's guide, the subsystem is "responsible for creating, monitoring and maintaining the security environment" and "its functions include managing the boot process, initializing various security related mechanisms, and monitoring the system for any suspicious activity or events and implementing an appropriate response". Critics worry it can be used as a backdoor and is a security concern. AMD has denied requests to open source the code that runs on the PSP.

We don't have any images related to AMD Platform Security Processor yet.
We don't have any YouTube videos related to AMD Platform Security Processor yet.
We don't have any PDF documents related to AMD Platform Security Processor yet.
We don't have any Books related to AMD Platform Security Processor yet.
We don't have any archived web articles related to AMD Platform Security Processor yet.

Details

The PSP itself represents an ARM core (ARM Cortex-A5) with the TrustZone extension which is inserted into the main CPU die as a coprocessor. The PSP contains on-chip firmware which is responsible for verifying the SPI ROM and loading off-chip firmware from it. In 2019, a Berlin-based security group discovered the off-chip firmware in ordinary UEFI image files (the code that boots up the operating system), which meant that it could be easily analyzed. By using a few hand-written Python-based tools, they found that the off-chip firmware from the SPI ROM contained an application resembling an entire micro operating system.789 Investigation of a Lenovo ThinkPad A285 notebook's motherboard flash chip (stores UEFI firmware) revealed that the PSP core itself (as a device) is run before the main CPU and that its firmware bootstrapping process starts just before basic UEFI gets loaded. They discovered that the firmware is run inside in the same system's memory space that user's applications do with unrestricted access to it (including MMIO) raising concerns over data safety.101112 Because PSP is the chip that decides whenever the x86 cores will run or not, it is used to implement hardware downcoring, specific cores on the system can be made permanently inaccessible during manufacturing. The PSP also provides a random number generator for the RDRAND instruction13 and provides TPM services.

Boot process

The PSP is an integral part of the boot process, without which the x86 cores would never be activated.

On-chip phase Firmware located directly on the PSP chip sets up the ARM CPU, verifies the integrity of the SPI ROM, using various data structures locates the off-chip firmware (AGESA) from the SPI ROM, and copies it over to internal PSP memory. Off-chip phase The loaded off-chip modules will initialize DRAM and perform platform initialization. Using the previous data structures the off-chip firmware finds UEFI firmware within the SPI ROM and copies it over to DRAM, it may perform additional verification steps and if the system is deemed secure, it will release the x86 cores from their reset state, thus starting UEFI firmware.

Reported vulnerabilities

In September 2017, Google security researcher Cfir Cohen reported a vulnerability to AMD of a PSP subsystem that could allow an attacker access to passwords, certificates, and other sensitive information; a patch was rumored to become available to vendors in December 2017.1415

In March 2018, an Israeli IT security company reported a handful of allegedly serious flaws related to the PSP in AMD's Zen architecture CPUs (EPYC, Ryzen, Ryzen Pro, and Ryzen Mobile) that could allow malware to run and gain access to sensitive information.16 AMD announced firmware updates to handle these flaws.1718 Their validity from a technical standpoint was upheld by independent security experts who reviewed the disclosures, although the high risks claimed by CTS Labs were dismissed,19 leading to claims that the flaws were published for the purpose of stock manipulation.2021

See also

References

  1. Williams, Rob (2017-07-19). "AMD Confirms It Won't Opensource EPYC's Platform Security Processor Code". This chip is found on most AMD platforms from 2013 on, and behaves much like Intel's Management Engine does [...] The rather blunt realization that PSP wasn't being open sourced came out during a discussion with AMD top brass about EPYC. https://hothardware.com/news/amd-confirms-it-will-not-be-opensourcing-epycs-platform-security-processor-code

  2. "BIOS and Kernel Developer's Guide (BKDG) for AMD Family 16h Models 30h-3Fh Processors" (PDF). AMD. 2016. p. 156. http://support.amd.com/TechDocs/52740_16h_Models_30h-3Fh_BKDG.pdf

  3. Martin, Ryan (July 2013). "Expert Says NSA Have Backdoors Built Into Intel And AMD Processors". eteknix.com. Retrieved 2018-01-19. https://www.eteknix.com/expert-says-nsa-have-backdoors-built-into-intel-and-amd-processors/

  4. Claburn, Thomas (2018-01-06), Security hole in AMD CPUs' hidden secure processor code revealed ahead of patches, The Register https://www.theregister.co.uk/2018/01/06/amd_cpu_psp_flaw/

  5. Larabel, Michael (2017-12-07). "AMD Reportedly Allows Disabling PSP Secure Processor With Latest AGESA". This built-in AMD Secure Processor has been criticized by some as another possible attack vector... /wiki/Michael_Larabel

  6. Williams, Rob (2017-07-19). "AMD Confirms It Won't Opensource EPYC's Platform Security Processor Code". This chip is found on most AMD platforms from 2013 on, and behaves much like Intel's Management Engine does [...] The rather blunt realization that PSP wasn't being open sourced came out during a discussion with AMD top brass about EPYC. https://hothardware.com/news/amd-confirms-it-will-not-be-opensourcing-epycs-platform-security-processor-code

  7. Werling, Christian; Buhren, Robert (24 August 2019), Dissecting the AMD Platform Security Processor, retrieved 2020-07-26 https://media.ccc.de/v/thms-38-dissecting-the-amd-platform-security-processor#t=91

  8. Cameran, James (2020-03-06). "Dissecting the AMD Platform Security Processor". SkillsFutureTV Academy. Archived from the original on 2020-07-26. Retrieved 2020-07-26. https://web.archive.org/web/20200726141756/https://skillsfuturetv.com/dissecting-the-amd-platform-security-processor/

  9. "Dissecting the AMD Platform Security Processor". YouTube. Archived from the original on 2020-08-11. https://www.youtube.com/watch?v=n9dhHG4tbE0

  10. Werling, Christian; Buhren, Robert (24 August 2019), Dissecting the AMD Platform Security Processor, retrieved 2020-07-26 https://media.ccc.de/v/thms-38-dissecting-the-amd-platform-security-processor#t=91

  11. Cameran, James (2020-03-06). "Dissecting the AMD Platform Security Processor". SkillsFutureTV Academy. Archived from the original on 2020-07-26. Retrieved 2020-07-26. https://web.archive.org/web/20200726141756/https://skillsfuturetv.com/dissecting-the-amd-platform-security-processor/

  12. "Dissecting the AMD Platform Security Processor". YouTube. Archived from the original on 2020-08-11. https://www.youtube.com/watch?v=n9dhHG4tbE0

  13. "AMD Random Number Generator" (PDF). AMD. 2017-06-27. https://www.amd.com/system/files/TechDocs/amd-random-number-generator.pdf

  14. Millman, Rene (2018-01-08). "Security issue found in AMD's Platform Security Processor". https://www.scmagazineuk.com/security-issue-found-in-amds-platform-security-processor/article/735414/

  15. Cimpanu, Catalin (2018-01-06). "Security Flaw in AMD's Secure Chip-On-Chip Processor Disclosed Online". https://www.bleepingcomputer.com/news/security/security-flaw-in-amds-secure-chip-on-chip-processor-disclosed-online/

  16. Goodin, Dan (2018-03-13). "A raft of flaws in AMD chips makes bad hacks much, much worse". Ars Technica. https://arstechnica.com/information-technology/2018/03/a-raft-of-flaws-in-amd-chips-make-bad-hacks-much-much-worse/

  17. Bright, Peter (2018-03-20). "AMD promises firmware fixes for security processor bugs All bugs require administrative access to exploit". Ars Technica. /w/index.php?title=Peter_Bright&action=edit&redlink=1

  18. Papermaster, Mark (2018-03-21). "Initial AMD Technical Assessment of CTS Labs Research". AMD Community. /wiki/Mark_Papermaster

  19. Guido, Dan (15 March 2018). ""AMD Flaws" Technical Summary". https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary

  20. Burke, Steve; Lathan, Patrick. "Assassination Attempt on AMD by Viceroy Research & CTS Labs, AMD "Should Be $0"". GamersNexus. Archived from the original on 2019-12-20. Retrieved 2018-09-18. https://web.archive.org/web/20191220041110/https://www.gamersnexus.net/industry/3260-assassination-attempt-on-amd-by-viceroy-research-cts-labs

  21. Zynath Investment. "AMD And CTS Labs: A Story Of Failed Stock Manipulation". Seeking Alpha. https://seekingalpha.com/article/4157242-amd-cts-labs-story-failed-stock-manipulation