YoVDO

Getting Physical with USB Type-C - Windows 10 RAM Forensics and UEFI Attacks

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Embedded Systems Courses Microcontrollers Courses Reverse Engineering Courses Hardware Security Courses Firmware Analysis Courses ACPI Courses

Course Description

Overview

Explore the hidden world of embedded microcontrollers and their potential security implications in modern hardware devices. Delve into the Surface Aggregator Module (SAM) on the Surface Pro 4, examining its functionality, security measures, and firmware update processes. Learn about the similarities between SAM and Apple's SMC, and discover how these components interact with various sensors, expansion ports, and ACPI EC. Investigate the potential misuse of SAM for hardware implants and gain insights into its firmware format, UEFI relationships, ACPI and AML interactions, and physical bus access. Understand the vulnerabilities in embedded systems like USB-PD, ACPI EC, SMBus, and SMC, and their significance in the context of evolving software and CPU defenses. Gain valuable knowledge from Alex Ionescu, a renowned security architect and expert in low-level system software, kernel development, and reverse engineering.

Syllabus

Recon2017-Getting Physical with USB Type-C:Windows 10 RAM Forensics and UEFI Attacks by Alex Ionescu


Taught by

Recon Conference

Related Courses

Embedded Systems - Shape The World: Microcontroller Input/Output
The University of Texas at Austin via edX
Model Checking
Chennai Mathematical Institute via Swayam
Introduction to the Internet of Things and Embedded Systems
University of California, Irvine via Coursera
Sistemas embebidos: Aplicaciones con Arduino
Universidad Nacional Autónoma de México via Coursera
Quantitative Formal Modeling and Worst-Case Performance Analysis
EIT Digital via Coursera