Главная
Study mode:
on
1
Introduction
2
Alex Matrosov
3
The Golden Age
4
Firmware Implant
5
Endpoint Security
6
Windows Changes
7
BIOS Lock
8
Brave New World
9
Firmware Updates
10
Boot Guard
11
Firmware
12
Persistence
13
Golden Age
14
Mitigations
15
Offensive Research Team
16
Cloud Problems
17
Guest Bias
18
Coreboot Bias
19
Google Cloud
20
BMC
21
Supply chain problem
22
Hardware vendors
23
Secure Boot
24
Trauma Hudson
25
Alex Yermolov
26
Alexs research
27
Flagk
28
Supply Chain Hell
29
Root of Trust Problems
30
Microsoft Cerberus
31
Operation Shadow Hammer
32
Arm Race
33
Best Question
Description:
Explore the evolution of advanced threats and the corresponding development of defensive software in this conference talk from Ekoparty 2019. Delve into the ongoing arms race between researchers and threat actors as they compete for dominance in the cybersecurity landscape. Examine how modern operating systems are implementing new mitigations to increase the cost of exploitation and malware persistence, while advanced threat actors seek lower levels of persistence closer to hardware and firmware. Investigate the gaps in current forensics and reverse engineering tools, and consider potential solutions to improve visibility and prevent advanced threats originating from levels where security sensors are absent. Learn from Alex Matrosov's extensive experience in reverse engineering, malware analysis, and firmware security as he provides insights into the challenges faced by security researchers in staying ahead of evolving threats.

The Advanced Threats Evolution- REsearchers Arm Race - Alex Matrosov - Ekoparty Security Conference - 2019

Ekoparty Security Conference
Add to list
0:00 / 0:00