YoVDO

Firmware Security Courses

ThunderStrike 2 - Sith Strike
Black Hat via YouTube
Firmware.RE - Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service
Black Hat via YouTube
Computrace Backdoor Revisited
Black Hat via YouTube
Extreme Privilege Escalation on Windows 8 - UEFI Systems
Black Hat via YouTube
FirmWar - An Imminent Threat to the Foundation of Computing
Black Hat via YouTube
Verifiable End-to-End Secure OCI Native Machines
Linux Foundation via YouTube
Establishing Trust in Linux Keyrings - Built-in, Imputed, or Transitive Trust
Linux Foundation via YouTube
Demystifying Intel Security Technologies in Firmware
Linux Foundation via YouTube
Trusted Firmware - Building Secure Firmware Collaboratively
Linux Foundation via YouTube
IoT Developer's Guide to Building Secure IoT Devices
Linux Foundation via YouTube
< Prev Page 5 Next >