Главная
Study mode:
on
1
Intro
2
Overview
3
Secure boot?
4
Secure boot theory
5
Secure boot example
6
ways to ...
7
debug access to boot stage (JTAG) riscure
8
Debug/service functionality
9
Nook boot UART exploit
10
18. Overriding boot source medium
11
TOCTOU race conditions
12
Timing attacks
13
Timing attack with Infectus board
14
XBOX 360 timing attack procedure
15
Glitch sensitivity
16
Glitch demo
17
Is it a real attack?
18
Slot machine EMP Jamming
19
Code section
20
EM-FI Transient Probe
21
Research probes
22
Design mistakes
23
Accessibility of boot ROM after boot riscure
24
Crypto sanitization
25
Firmware Upgrade / Recovery flaws riscure
26
Relying on unverified code
27
Service backdoor/password
28
State errors
29
Driver weaknesses
30
ROM patching functionality
31
Inappropriate signing area
32
Key management
33
Weak signing keys/methods
34
Parting thoughts
Description:
Explore 20 methods for bypassing secure boot systems in this comprehensive conference talk. Delve into secure boot theory and examples before examining various attack vectors, including debug access, service functionality exploits, and UART vulnerabilities. Learn about timing attacks, glitch sensitivity, and electromagnetic fault injection techniques. Investigate design flaws, firmware upgrade vulnerabilities, and cryptographic weaknesses. Gain insights into key management issues and weak signing methods. Conclude with valuable parting thoughts on improving secure boot implementations and defending against potential exploits.

20 Ways Past Secure Boot

WEareTROOPERS
Add to list
0:00 / 0:00