YoVDO

Booting with Caution: Dissecting Secure Boot's Third-Party Attack Surface

Offered By: OffensiveCon via YouTube

Tags

Secure Boot Courses Cybersecurity Courses Reverse Engineering Courses Hardware Security Courses Operating System Security Courses Exploit Development Courses Firmware Security Courses UEFI Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Secure Boot's third-party attack surface in this 56-minute conference talk from OffensiveCon24. Delve into the potential vulnerabilities and security challenges associated with the boot process, gaining valuable insights into system security and potential exploitation vectors. Learn about the complexities of Secure Boot implementation and discover how third-party components can introduce unexpected risks to the boot sequence.

Syllabus

OffensiveCon24 -Bill Demirkapi - Booting with Caution


Taught by

OffensiveCon

Related Courses

Protecting Devices and Applications in Microsoft 365
Pluralsight
vSphere 6.7 Professional Part 04: Securing a Deployment
LinkedIn Learning
VMware vSphere 7 Professional: 04 Securing a vSphere Deployment
LinkedIn Learning
The One Weird Trick SecureROM Hates - Vol. 2
nullcon via YouTube
I Boot when U-Boot
nullcon via YouTube