YoVDO

Boot2root - Auditing Boot Loaders by Example

Offered By: media.ccc.de via YouTube

Tags

Conference Talks Courses Cybersecurity Courses

Course Description

Overview

Explore the vulnerabilities in secure boot chains through this comprehensive conference talk from the 36th Chaos Communication Congress (36C3). Dive into an in-depth audit of commonly used boot loaders, examining the extensive attack surface they present. Discover surprising weaknesses in hardening and defense-in-depth strategies. Follow along as experts Ilja van Sprundel and Joseph Tartaro dissect various attack vectors, from remote exploits via network protocol parsers to local filesystem vulnerabilities and BUS parsing issues. Gain valuable insights into the realistic threats facing secure boot implementations and learn how to identify and mitigate common mistakes in boot loader security.

Syllabus

36C3 - Boot2root


Taught by

media.ccc.de

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube