Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Betraying the BIOS: Where the Guardians of the BIOS are Failing

Автор: Black Hat

Загружено: 2018-01-29

Просмотров: 9855

Описание:

For UEFI firmware, the barbarians are at the gate -- and the gate is open. On the one hand, well-intentioned researchers are increasingly active in the UEFI security space; on the other hand, so are attackers. Information about UEFI implants -- by HackingTeam and state-sponsored actors alike -- hints at the magnitude of the problem, but are these isolated incidents, or are they indicative of a more dire lapse in security?

By Alex Matrosov

Full Abstract & Presentation Materials:
https://www.blackhat.com/us-17/briefi...

Betraying the BIOS: Where the Guardians of the BIOS are Failing

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

LogoFAIL: Security Implications of Image Parsing During System Boot

LogoFAIL: Security Implications of Image Parsing During System Boot

Fad or Future? Getting Past the Bug Bounty Hype

Fad or Future? Getting Past the Bug Bounty Hype

How to Install and Run AppImage Software on Linux

How to Install and Run AppImage Software on Linux

Malware Buried Deep Down the SPI Flash: Sednit's First UEFI Rootkit Found in the Wild

Malware Buried Deep Down the SPI Flash: Sednit's First UEFI Rootkit Found in the Wild

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

Firmware security, why it matters and how you can have it

Firmware security, why it matters and how you can have it

AMI vs. coreboot: Which BIOS is Best for Your Protectli Vault?

AMI vs. coreboot: Which BIOS is Best for Your Protectli Vault?

Retro MS-DOS Coding - Recreating the Iconic Award BIOS Screen

Retro MS-DOS Coding - Recreating the Iconic Award BIOS Screen

DEF CON 22 - Kallenberg and Kovah - Extreme Privilege Escalation On Windows 8/UEFI Systems

DEF CON 22 - Kallenberg and Kovah - Extreme Privilege Escalation On Windows 8/UEFI Systems

Как взломать любое программное обеспечение

Как взломать любое программное обеспечение

Breaking Firmware Trust From Pre-EFI: Exploiting Early Boot Phases

Breaking Firmware Trust From Pre-EFI: Exploiting Early Boot Phases

Как финский гик ВЫНЕС Майкрософт и стал богом айти // Линус Торвальдс

Как финский гик ВЫНЕС Майкрософт и стал богом айти // Линус Торвальдс

Ichthyology: Phishing as a Science

Ichthyology: Phishing as a Science

BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux/IoT Device

BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux/IoT Device

36C3 -  Intel Management Engine deep dive

36C3 - Intel Management Engine deep dive

RUST: Язык Программирования, Который ЗАМЕНИТ C и C++

RUST: Язык Программирования, Который ЗАМЕНИТ C и C++

Chips & Salsa Episode 22 – The State of Firmware Security with Alex Matrosov | Intel Technology

Chips & Salsa Episode 22 – The State of Firmware Security with Alex Matrosov | Intel Technology

UEFI Malware - The Low Level Threat To Millions of PCs

UEFI Malware - The Low Level Threat To Millions of PCs

Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets

Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets

DEF CON 26 - Shkatov and Michael - UEFI Exploitation for the Masses

DEF CON 26 - Shkatov and Michael - UEFI Exploitation for the Masses

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]