YoVDO

Booting with Caution: Dissecting Secure Boot's Third-Party Attack Surface

Offered By: OffensiveCon via YouTube

Tags

Secure Boot Courses Cybersecurity Courses Reverse Engineering Courses Hardware Security Courses Operating System Security Courses Exploit Development Courses Firmware Security Courses UEFI Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Secure Boot's third-party attack surface in this 56-minute conference talk from OffensiveCon24. Delve into the potential vulnerabilities and security challenges associated with the boot process, gaining valuable insights into system security and potential exploitation vectors. Learn about the complexities of Secure Boot implementation and discover how third-party components can introduce unexpected risks to the boot sequence.

Syllabus

OffensiveCon24 -Bill Demirkapi - Booting with Caution


Taught by

OffensiveCon

Related Courses

I Boot when U-Boot
nullcon via YouTube
The Internet of Insecure Things - 10 Most Wanted List
YouTube
Attacking IOBluetoothFamily HCI and Vendor-Specific Commands
Black Hat via YouTube
Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller
Black Hat via YouTube
Securing Your In-Ear Fitness Coach - Challenges in Hardening Next Generation Wearables
Black Hat via YouTube