How does the AC check the BIOS version? If you have DMA you should be able to spoof that, even against the kernel I assume. I guess its a cat and mouse of spoofing detection by the AC versus the cheat devs?
Possibly TPM backed remote attestation. Having said that, once you are at the point of being worried about hardware DMA attacks, TPM attestation is not as full proof as you might think.
The bios flaw they were exploring was the bios having flawed anti DMA protections.
From the article
According to the company, the Input-Output Memory Management Unit (IOMMU), which protects system RAM from Direct Memory Access (DMA) devices, is not fully initializing upon boot in some motherboard models. This means that even though the BIOS might indicate that Pre-Boot DMA Protection is active, it’s not actually protecting the entire system.
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]
No game suggestions, friend requests, surveys, or begging.
No Let’s Plays, streams, highlight reels/montages, random videos or shorts.
No off-topic posts/comments, within reason.
Use the original source, no clickbait titles, no duplicates.
(Submissions should be from the original source if possible, unless from paywalled or non-english sources.
If the title is clickbait or lacks context you may lightly edit the title.)
How does the AC check the BIOS version? If you have DMA you should be able to spoof that, even against the kernel I assume. I guess its a cat and mouse of spoofing detection by the AC versus the cheat devs?
Possibly TPM backed remote attestation. Having said that, once you are at the point of being worried about hardware DMA attacks, TPM attestation is not as full proof as you might think.
The bios flaw they were exploring was the bios having flawed anti DMA protections.
From the article