Share via

System Integrity Team Blog

BitLocker, Brossard’s Pre-boot Authentication Research, and the BSI

Attending DEFCON presentations that target a product you use or helped build can be exciting in a...

Author: siblog Date: 09/04/2008

Redirect to new post title

Protecting BitLocker from Cold Attacks (and other threats)

Author: siblog Date: 02/25/2008

Protecting BitLocker from Cold Attacks (and other threats)

Hi. My name is Douglas MacIver and I specialize in security assurance at Microsoft as a member of...

Author: siblog Date: 02/25/2008

Detecting BitLocker

Although the most appropriate way to detect BitLocker is to use the interfaces in BitLocker’s WMI...

Author: siblog Date: 10/26/2006

Multi-boot Security

As people start analyzing BitLocker, a question that keeps getting raised is "Can I break into...

Author: siblog Date: 10/03/2006

BitLocker cryptographic algorithm published

While working on the BitLocker data encryption we realized that no existing algorithm satisfied all...

Author: siblog Date: 09/15/2006

BitLocker recovery password details

Recently the BitLocker Penetration team was asked some questions about the security of the recovery...

Author: siblog Date: 08/10/2006

AES test vectors

I’ve been working to optimize our AES implementation. BitLocker encrypts and decrypts more data than...

Author: siblog Date: 05/19/2006

Finding a Secure PIN

BitLocker Drive Encryption offers users a number of different modes to protect the key used in...

Author: siblog Date: 04/10/2006

What got me out of bed today?

Recently I read yet another report ( of stolen laptops...

Author: siblog Date: 03/21/2006

Back-door nonsense

Two weeks ago BBC News published an article speculating about a possible “back door” in BitLocker...

Author: siblog Date: 03/02/2006

Welcome to the System Integrity Team blog.

I finally managed to organize a team blog so that we can put out some technical information without...

Author: siblog Date: 03/02/2006