YoVDO

Baring the System - New Vulnerabilities in SMM of Coreboot and UEFI Based Systems

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Vulnerability Analysis Courses coreboot Courses Firmware Security Courses UEFI Courses

Course Description

Overview

Explore new vulnerabilities in System Management Mode (SMM) affecting Coreboot and UEFI-based systems in this conference talk from Recon 2017 Brussels. Delve into an entirely new class of vulnerabilities in SMI handlers, caused by incorrect trust assumptions between firmware and hardware. Learn about the impact of these issues on various system firmware types and discover potential mitigation techniques. Gain insights into the researchers' previous findings on UEFI-based firmware vulnerabilities and their consequences, including attacks on hypervisors and bypassing Windows 10 security protections. Understand the changes implemented in OS-SMM communication and the introduction of Windows SMM Security Mitigations ACPI Table (WSMT). Get introduced to a new module for the open-source CHIPSEC framework, designed to automatically detect these vulnerabilities on running systems. Benefit from the expertise of Yuriy Bulygin, lead of the Advanced Threat Research team at Intel Security, and Oleksandr Bazhaniuk, a security researcher specializing in low-level hardware and BIOS/UEFI security.

Syllabus

recon 2017 Brussels-Baring the system:New vulnerabilities in SMM of Coreboot and UEFI based systems


Taught by

Recon Conference

Related Courses

Harnessing Intel Processor Trace on Windows for Fuzz
Recon Conference via YouTube
Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube
Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube
DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube
Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube