YoVDO

A Dark Side of UEFI: Cross-Silicon Exploitation

Offered By: OffensiveCon via YouTube

Tags

UEFI Courses Cybersecurity Courses Memory Leaks Courses ARM Architecture Courses Trustzone Courses Stack Overflows Courses Firmware Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of UEFI vulnerabilities and cross-silicon exploitation techniques in this OffensiveCon23 conference talk. Delve into the Arm perspective on UEFI, examining file systems, BIOS regions, platform configurations, and boot order processes. Investigate UART redirection, hypervisor environments, and automation techniques. Learn about memory leak vulnerabilities, stackable overflows, and UEFI depth protection. Discover the intricacies of Project UEFI Rust and its implications for security. Gain insights into TrustZone weaknesses and SM ROM dump techniques. Presented by Alex Matrosov and Alex Ermolov, this talk offers a deep dive into the dark side of UEFI and its potential for cross-silicon exploitation.

Syllabus

Introduction
Arm perspective on UEFI
Microsoft Windows Development Kit 2023
File Systems
BIOS Region
Platform Configuration
UART Redirection
Boot Order
Hypervisor
Environment variables
Environment Arm
Automation
Vulnerabilities
Research Approach
Memory Leak Vulnerability
Proof of Concept
Demo
Stackable Overflows
Second Stack Overflow
Third Stack Overflow Explanation
UEFI Depth Protection
Candor
Building the Rope
Project UEFI Rust
Demonstration
Triggerable
TrustZone
The Trust Zone
Executive Weaknesses
SM ROM Dump
Alex Ermolov


Taught by

OffensiveCon

Related Courses

100+ Exercises - Advanced Python Programming
Udemy
230+ Exercises - Python for Data Science - NumPy + Pandas
Udemy
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Abusing Normality - Data Exfiltration in Plain Site
LASCON via YouTube
Analogue Evolution, Digital Revolution - Tipping Points in Technology
GOTO Conferences via YouTube