13.03.2013 Views

Hacking the Xbox

Hacking the Xbox

Hacking the Xbox

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

104<br />

<strong>Hacking</strong> <strong>the</strong> <strong>Xbox</strong>: An Introduction to Reverse Engineering<br />

being passed between two parties. Because of <strong>the</strong> man-in-<strong>the</strong>-middle<br />

weakness, it does not make sense to use an extremely sophisticated tamperproof<br />

module to make <strong>the</strong> system measurements. A single packaged<br />

silicon chip is probably good enough, as it is typically easier to intercept<br />

and spoof <strong>the</strong> measurement data going past on a printed circuit board<br />

than it is to penetrate <strong>the</strong> epoxy package of a chip and modify <strong>the</strong> chip’s<br />

circuitry.<br />

The trust measurement system can be implemented using a measure-once<br />

approach. Starting with <strong>the</strong> processor cold-boot sequence, every piece of<br />

code is measured for trust before execution. If <strong>the</strong> processor never executes<br />

untrusted code, <strong>the</strong>n what is <strong>the</strong>re not to trust? This scheme requires a very<br />

simple tamper-proof hardware module — a tamper-proof ROM that<br />

stores <strong>the</strong> cold-boot code, a “seed” of trust. The type of cryptography<br />

used for <strong>the</strong> measurement and verification process is typically a combination<br />

of hashes and public-key cryptography. Public-key cryptography is<br />

preferred for this application because <strong>the</strong> private key required to generate<br />

a valid code segment is a secret kept by only <strong>the</strong> hardware vendor. Again,<br />

this scheme is vulnerable to many kinds of man-in-<strong>the</strong>-middle attacks, as<br />

well as pure cryptographic attacks and attacks on <strong>the</strong> implementation of<br />

<strong>the</strong> system.<br />

A Brief Primer on Cryptography<br />

ci·pher (n): 1 a: ZERO b: one that has no weight, worth, or influence<br />

: NONENTITY. 2 a: a method of transforming text in order to<br />

conceal its meaning — compare to CODE 2<br />

Ciphers provide no security on <strong>the</strong>ir own. More specifically, ciphers only<br />

provide security if <strong>the</strong> key is secure, if <strong>the</strong> algorithm is strong, and if <strong>the</strong>re<br />

are no back doors into <strong>the</strong> system. If someone hands you a CD-ROM<br />

encrypted with a strong cipher and locks you in a padded room with a<br />

supercomputer, <strong>the</strong> sun will probably go supernova before you can decrypt<br />

<strong>the</strong> CD-ROM. On <strong>the</strong> o<strong>the</strong>r hand, if you could observe and probe <strong>the</strong><br />

machine as it was working to encrypt <strong>the</strong> CD-ROM, <strong>the</strong> encryption is moot.<br />

You could get <strong>the</strong> enciphering key by eavesdropping <strong>the</strong> keyboard. Or, you<br />

could dump <strong>the</strong> contents of <strong>the</strong> computer’s memory and obtain <strong>the</strong><br />

plaintext without knowing <strong>the</strong> key.<br />

The situation with <strong>the</strong> <strong>Xbox</strong> is similar to <strong>the</strong> latter. Ultimately, <strong>the</strong> <strong>Xbox</strong><br />

must access and run <strong>the</strong> programs presented to it on valid disks. Fur<strong>the</strong>rmore,<br />

<strong>the</strong> Pentium CPU used in <strong>the</strong> <strong>Xbox</strong> cannot tell <strong>the</strong> difference<br />

between an authorized instruction and an unauthorized instruction.<br />

Finally, <strong>the</strong> user has full access to probe and modify <strong>the</strong> <strong>Xbox</strong> hardware.<br />

Thus, even if <strong>the</strong> <strong>Xbox</strong> uses strong ciphers, <strong>the</strong> security of keys is<br />

questionable, and <strong>the</strong>re may be back doors into <strong>the</strong> system.<br />

2 Merriam-Webster OnLine Dictionary (www.webster.com).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!