Главная
Study mode:
on
1
Intro
2
Hardware Security Boundaries
3
Methodology
4
EC firmware update process
5
Impact of EC update auth bypass
6
Lenovo Thinkpad EC update header
7
Lenovo Thinkpad EC update process
8
Boot Guard saves the day?
9
Lenovo Thinkpad EC signature check
10
Lenovo disclosure timeline
11
EC take-aways
12
Intel BIOS Guard in a nutshell
13
What is Intel BIOS Guard?
14
Lenovo Thinkpad PFAT update process
15
BIOS Guard hardware support
16
BIOS Guard ACM execution flow
17
BIOS Guard Directory
18
BIOS Guard Platform Data Table
19
BIOS Guard Update Package
20
Signed vs unsigned operations with BIOS Guard script
Description:
Explore reverse engineering techniques for Embedded Controllers (EC) in recent Lenovo Thinkpad laptops in this Black Hat conference talk. Delve into attacks from EC trusted boundaries on main platform firmware (BIOS) and learn how to bypass Intel BIOS Guard technology in Lenovo's specific implementation. Understand hardware security boundaries, EC firmware update processes, and the impact of EC update authentication bypass. Examine Lenovo Thinkpad EC update headers, signature checks, and disclosure timelines. Gain insights into Intel BIOS Guard, including its structure, hardware support, and execution flow. Analyze BIOS Guard Directory, Platform Data Table, and Update Package components. Compare signed and unsigned operations with BIOS Guard scripts to enhance your knowledge of firmware security vulnerabilities and mitigation strategies.

Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller

Black Hat
Add to list
0:00 / 0:00