Breaking Firmware Trust From Pre-EFI - Exploiting Early Boot Phases
Offered By: Ekoparty Security Conference via YouTube
Course Description
Overview
Explore the evolution of firmware security and new attack vectors in a conference talk from Ekoparty 2022. Delve into vulnerabilities in System Management Mode (SMM) and UEFI applications/drivers, examining the impact of Intel's new platform firmware runtime mitigations on the attack surface. Learn about recent changes in UEFI firmware security runtime, focusing on the latest Intel CPUs. Discover new attacks on Intel Platform Properties Assessment Module (PPAM) and their interaction with Intel SMI Transfer Monitor (STM). Gain insights from Alex Matrosov, CEO and Founder of Binarly Inc., as he shares his expertise in reverse engineering, malware analysis, and firmware security, offering a unique perspective on offensive security research in this cutting-edge field.
Syllabus
Alex Matrosov - Breaking Firmware Trust From Pre-EFI: Exploiting Early Boot Phases - Ekoparty 2022
Taught by
Ekoparty Security Conference
Related Courses
1-Click to Infiltrate Your Organization via Vulnerable VS Code ExtensionsEkoparty Security Conference via YouTube 20 AƱos Desarrollando Software - Del SAC-D y el SAOCOM al SABIA MAR
Ekoparty Security Conference via YouTube 99% Coraje, 1% Know How
Ekoparty Security Conference via YouTube A Practical Guide to Fuzz Testing Embedded Software in a CI Pipeline - Dennis Kengo Oka - Ekoparty 2021: Hardware Hacking Space
Ekoparty Security Conference via YouTube A Study on Android Pre-Tests - Mobile Hacking
Ekoparty Security Conference via YouTube