System Integrity Team Blog
BitLocker, Brossard’s Pre-boot Authentication Research, and the BSI
Attending DEFCON presentations that target a product you use or helped build can be exciting in a...
Date: 09/04/2008
Redirect to new post title
Protecting BitLocker from Cold Attacks (and other threats)
Date: 02/25/2008
Protecting BitLocker from Cold Attacks (and other threats)
Hi. My name is Douglas MacIver and I specialize in security assurance at Microsoft as a member of...
Date: 02/25/2008
Detecting BitLocker
Although the most appropriate way to detect BitLocker is to use the interfaces in BitLocker’s WMI...
Date: 10/26/2006
Multi-boot Security
As people start analyzing BitLocker, a question that keeps getting raised is "Can I break into...
Date: 10/03/2006
BitLocker cryptographic algorithm published
While working on the BitLocker data encryption we realized that no existing algorithm satisfied all...
Date: 09/15/2006
BitLocker recovery password details
Recently the BitLocker Penetration team was asked some questions about the security of the recovery...
Date: 08/10/2006
AES test vectors
I’ve been working to optimize our AES implementation. BitLocker encrypts and decrypts more data than...
Date: 05/19/2006
Finding a Secure PIN
BitLocker Drive Encryption offers users a number of different modes to protect the key used in...
Date: 04/10/2006
What got me out of bed today?
Recently I read yet another report (https://www.komotv.com/stories/42263.htm) of stolen laptops...
Date: 03/21/2006
Back-door nonsense
Two weeks ago BBC News published an article speculating about a possible “back door” in BitLocker...
Date: 03/02/2006
Welcome to the System Integrity Team blog.
I finally managed to organize a team blog so that we can put out some technical information without...
Date: 03/02/2006