Baring the System - New Vulnerabilities in SMM of Coreboot and UEFI Based Systems
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore new vulnerabilities in System Management Mode (SMM) affecting Coreboot and UEFI-based systems in this conference talk from Recon 2017 Brussels. Delve into an entirely new class of vulnerabilities in SMI handlers, caused by incorrect trust assumptions between firmware and hardware. Learn about the impact of these issues on various system firmware types and discover potential mitigation techniques. Gain insights into the researchers' previous findings on UEFI-based firmware vulnerabilities and their consequences, including attacks on hypervisors and bypassing Windows 10 security protections. Understand the changes implemented in OS-SMM communication and the introduction of Windows SMM Security Mitigations ACPI Table (WSMT). Get introduced to a new module for the open-source CHIPSEC framework, designed to automatically detect these vulnerabilities on running systems. Benefit from the expertise of Yuriy Bulygin, lead of the Advanced Threat Research team at Intel Security, and Oleksandr Bazhaniuk, a security researcher specializing in low-level hardware and BIOS/UEFI security.
Syllabus
recon 2017 Brussels-Baring the system:New vulnerabilities in SMM of Coreboot and UEFI based systems
Taught by
Recon Conference
Related Courses
Harnessing Intel Processor Trace on Windows for FuzzRecon Conference via YouTube Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube