Главная
Study mode:
on
1
Introduction
2
Arm perspective on UEFI
3
Microsoft Windows Development Kit 2023
4
File Systems
5
BIOS Region
6
Platform Configuration
7
UART Redirection
8
Boot Order
9
Hypervisor
10
Environment variables
11
Environment Arm
12
Automation
13
Vulnerabilities
14
Research Approach
15
Memory Leak Vulnerability
16
Proof of Concept
17
Demo
18
Stackable Overflows
19
Second Stack Overflow
20
Third Stack Overflow Explanation
21
UEFI Depth Protection
22
Candor
23
Building the Rope
24
Project UEFI Rust
25
Demonstration
26
Triggerable
27
TrustZone
28
The Trust Zone
29
Executive Weaknesses
30
SM ROM Dump
31
Alex Ermolov
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore a comprehensive analysis of UEFI vulnerabilities and cross-silicon exploitation techniques in this OffensiveCon23 conference talk. Delve into the Arm perspective on UEFI, examining file systems, BIOS regions, platform configurations, and boot order processes. Investigate UART redirection, hypervisor environments, and automation techniques. Learn about memory leak vulnerabilities, stackable overflows, and UEFI depth protection. Discover the intricacies of Project UEFI Rust and its implications for security. Gain insights into TrustZone weaknesses and SM ROM dump techniques. Presented by Alex Matrosov and Alex Ermolov, this talk offers a deep dive into the dark side of UEFI and its potential for cross-silicon exploitation.

A Dark Side of UEFI: Cross-Silicon Exploitation

OffensiveCon
Add to list
0:00 / 0:00