Главная
Study mode:
on
1
Introduction
2
Why is firmware so important
3
Firmware vulnerabilities
4
Firmware philosophy
5
Coreboot
6
KExec
7
How do we protect it
8
The problem with firmware
9
Disassembly
10
UEFI
11
Chromebook
12
Intel Management Engine
13
Protecting Secrets
14
Sealing Keys
15
Using Authenticators
16
Recovery
17
PGP Signature
18
Android Verified Boot
19
Cubes
20
Reproducible
21
Purism
22
Embedded Controller
23
Server Landscape
24
Mass Open Cloud
25
Key Lime
26
QA
Description:
Explore the world of open source firmware security in this 39-minute conference talk from Hack In The Box Security Conference. Dive into the Heads project, an open source custom firmware and OS configuration designed to enhance physical security and data protection for laptops and servers. Learn about the project's roots in firmware vulnerability research, its implementation of physical hardening and flash security features, and its use of custom Coreboot firmware with a Linux boot loader in ROM. Discover how Heads moves the root of trust into write-protected ROM, prevents modifications to bootup code, and uses TPM for hardware key storage and drive decryption. Examine the system's signed hypervisor, kernel, and initrd images, as well as its immutable root filesystem. Gain insights into how these firmware and software changes address various attack vectors against boot processes and physical hardware, raising the difficulty for potential attackers.

Bootstrapping Systems With Open Source Firmware

Hack In The Box Security Conference
Add to list
0:00 / 0:00