Firmware Security Courses
nullcon via YouTube The Internet of Insecure Things - 10 Most Wanted List
YouTube Attacking IOBluetoothFamily HCI and Vendor-Specific Commands
Black Hat via YouTube Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller
Black Hat via YouTube Securing Your In-Ear Fitness Coach - Challenges in Hardening Next Generation Wearables
Black Hat via YouTube My Threat Model is Your Threat Model
RSA Conference via YouTube Knockin' On MediaTek ADSP's Door
Hack In The Box Security Conference via YouTube Bypassing Hardware-Based Trusted Boot Through x86 Downgrade
Hack In The Box Security Conference via YouTube TOCTOU Attacks Against Secure Boot and BootGuard
Hack In The Box Security Conference via YouTube Bootstrapping Systems With Open Source Firmware
Hack In The Box Security Conference via YouTube