Dissecting the AMD Platform Security Processor (Reverse Engineering)

This is a talk about reverse engineering the AMD PSP ( like Intel Management Engine )

Very interesting talk : ( runtime 47:35 min )

The AMD Platform Security Processor (PSP) is a security subsystem in AMD CPUs comparable to the Intel ME and was introduced in 2013. It is essential for system startup – in fact, in runs before the main processor is even started – and offers runtime services to the main processor. For this, it has full access to the system memory space (inlcuding MMIO).

The PSP runs undocumented, proprietary firmware. This talk presents efforts of investigating what the PSP does and if it’s secure. For the first time, it documents the PSP firmware’s proprietary filesystem and provides insights into reverse-engineering such a deeply embedded system as the PSP. The talk further sheds light on how we might regain trust in AMD CPUs despite the delicate nature of the PSP.

AMD introduced the AMD Secure Processor to provide a trusted execution environment for critical operations. This talk comprehensively analyzes the undocumented and largely unknown security co-processor and discovers its inner workings. It aims to find out if it is able to keep its promise – or if it opens up another attack vector.


Would be great if enthusiasts did more work in this area… How to protect against this black box? Is the PSP provably less prone to remote blackdoors than ME, as many claim?

1 Like