YoVDO

Static Analysis-Based Recovery of Service Function Calls in UEFI Firmware

Offered By: Ekoparty Security Conference via YouTube

Tags

Ekoparty Security Conference Courses Reverse Engineering Courses Static Analysis Courses Vulnerability Research Courses Firmware Security Courses

Course Description

Overview

Explore a conference talk from Ekoparty Security Conference that delves into the automated recovery of service calls and EFI type information in UEFI firmware. Discover how this innovative tool simplifies the process of reversing UEFI firmware, making it appear more like original source code. Learn how this approach can significantly reduce the need for extensive background knowledge in firmware and hardware, potentially accelerating vulnerability hunting. Gain insights into the static analysis techniques used and their implications for firmware security research. This 47-minute presentation is ideal for cybersecurity professionals, firmware analysts, and anyone interested in UEFI firmware vulnerabilities and reverse engineering techniques.

Syllabus

#Eko2020 Main Track | Static analysis-based recovery of service function calls in UEFI firmware


Taught by

Ekoparty Security Conference

Related Courses

Case Studies in Embedded VR - Silvio Cesare - Ekoparty Security Conference - 2022
Ekoparty Security Conference via YouTube
The Making of an Aerospace Village Badge - Dan Allen - Ekoparty 2021: Patagon Aerospace
Ekoparty Security Conference via YouTube
IIoT, Data Infrastructure, Smart Factory - Sarka Pekarova - Ekoparty 2021: OT - IIOT - IOT Space
Ekoparty Security Conference via YouTube
Gotham City- SSH from Zero to Trust - Lucas Calisi - Ekoparty Security Conference - 2021
Ekoparty Security Conference via YouTube
Sleight of ARM- Demystifying Intel Houdini - Brian Hong - Ekoparty 2021- Hardware Hacking Space
Ekoparty Security Conference via YouTube