YoVDO

Breaking Firmware Trust From Pre-EFI - Exploiting Early Boot Phases

Offered By: Ekoparty Security Conference via YouTube

Tags

Ekoparty Security Conference Courses Reverse Engineering Courses Malware Analysis Courses Firmware Security Courses

Course Description

Overview

Explore the evolution of firmware security and new attack vectors in a conference talk from Ekoparty 2022. Delve into vulnerabilities in System Management Mode (SMM) and UEFI applications/drivers, examining the impact of Intel's new platform firmware runtime mitigations on the attack surface. Learn about recent changes in UEFI firmware security runtime, focusing on the latest Intel CPUs. Discover new attacks on Intel Platform Properties Assessment Module (PPAM) and their interaction with Intel SMI Transfer Monitor (STM). Gain insights from Alex Matrosov, CEO and Founder of Binarly Inc., as he shares his expertise in reverse engineering, malware analysis, and firmware security, offering a unique perspective on offensive security research in this cutting-edge field.

Syllabus

Alex Matrosov - Breaking Firmware Trust From Pre-EFI: Exploiting Early Boot Phases - Ekoparty 2022


Taught by

Ekoparty Security Conference

Related Courses

1-Click to Infiltrate Your Organization via Vulnerable VS Code Extensions
Ekoparty Security Conference via YouTube
20 AƱos Desarrollando Software - Del SAC-D y el SAOCOM al SABIA MAR
Ekoparty Security Conference via YouTube
99% Coraje, 1% Know How
Ekoparty Security Conference via YouTube
A Practical Guide to Fuzz Testing Embedded Software in a CI Pipeline - Dennis Kengo Oka - Ekoparty 2021: Hardware Hacking Space
Ekoparty Security Conference via YouTube
A Study on Android Pre-Tests - Mobile Hacking
Ekoparty Security Conference via YouTube