Главная
Study mode:
on
1
Introduction 2
2
BIOS is dead, long live UEFI!
3
About UEFI
4
UEFI Differences: Boot Phases
5
Legacy BIOS Firmware Storage
6
Firmware Files
7
Yay Standardization!
8
Security (SEC) Phase
9
SEC Responsibilities 1 of 2
10
Quick ACPI Note: Sleep Modes
11
SEC Responsibilities 2 of 2
12
SEC Hand-off to PEI Entry Point
13
Components of PEI
14
UEFI Non-Volatile Variables
15
EFI Variable Attributes Combinations
16
Authenticate how Keys and Key Stores
17
UEFI Variables (Keys and Key Stores) 2
18
Boot Device Selection (BDS)
19
Transient System Load (TSL)
Description:
Explore the intricacies of UEFI BIOS analysis from both offensive and defensive perspectives in this comprehensive Black Hat conference talk. Delve into the challenges of detecting malicious changes in BIOS and the limitations of current comparison methods. Gain insights into essential topics such as port IO, memory-mapped IO, PCI, SMM, and UEFI, crucial for effective modern BIOS analysis. Examine how UEFI's transparency impacts both attackers and defenders in firmware analysis. Learn about UEFI boot phases, firmware storage, security responsibilities, and key management. Discover the potential for firmware-level malware and the importance of developing expertise in this often overlooked area of cybersecurity.

Analyzing UEFI BIOSes from Attacker & Defender Viewpoints

Black Hat
Add to list