Firmware is the New Black - Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities
In recent years, we witnessed the rise of firmware-related vulnerabilities, likely a direct result of increasing adoption of exploit mitigations in major/widespread operating systems - including for mobile phones.
By Bruce Monroe, Rodrigo Branco & Vincent Zimmer
Full Abstract: https://www.blackhat.com/us-17/briefings/schedule/#firmware-is-the-new-black---analyzing-past-three-years-of-biosuefi-security-vulnerabilities-6924
Видео Firmware is the New Black - Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities канала Black Hat
By Bruce Monroe, Rodrigo Branco & Vincent Zimmer
Full Abstract: https://www.blackhat.com/us-17/briefings/schedule/#firmware-is-the-new-black---analyzing-past-three-years-of-biosuefi-security-vulnerabilities-6924
Видео Firmware is the New Black - Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Firmware security, why it matters and how you can have it](https://i.ytimg.com/vi/gP_9sUfpW_o/default.jpg)
![What is a Security Vulnerability?](https://i.ytimg.com/vi/866olNIzbrk/default.jpg)
![HTTP/2: The Sequel is Always Worse](https://i.ytimg.com/vi/sI6YS9a7Qyg/default.jpg)
![RSA Replay - The Power of Vulnerability](https://i.ytimg.com/vi/QMzBv35HbLk/default.jpg)
![Hardware Hacking - Computerphile](https://i.ytimg.com/vi/eOPLQxGNmHA/default.jpg)
![Secure Download Firmware Update (DFU)](https://i.ytimg.com/vi/pPrMTRvOv-Y/default.jpg)
![What is Firmware | Typical Examples of Firmware Reasons for Updating Firmware Computer Tech #12](https://i.ytimg.com/vi/-R_RKlNfOFM/default.jpg)
![Behind the Scenes of iOS Security](https://i.ytimg.com/vi/BLGFriOKz6U/default.jpg)
![Using Freestanding C++ for C++17 in Shellcode, UEFI, Embedded & Unikernels - Rian Quinn CppCon 2019](https://i.ytimg.com/vi/bKPN-CGhEC0/default.jpg)
![UEFI BIOS Repair Tutorial](https://i.ytimg.com/vi/wu2PWxJ5IU0/default.jpg)
![Ichthyology: Phishing as a Science](https://i.ytimg.com/vi/Z20XNp-luNA/default.jpg)
![Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller](https://i.ytimg.com/vi/g-1Y466rDaI/default.jpg)
![#04 - How To Get The Firmware - Hardware Hacking Tutorial](https://i.ytimg.com/vi/oY-MxtJLEos/default.jpg)
![ChaosDB: How We Hacked Databases of Thousands of Azure Customers (rev)](https://i.ytimg.com/vi/QiJAxo30w6U/default.jpg)
![ARMageddon: How Your Smartphone CPU Breaks Software-Level Security and Privacy](https://i.ytimg.com/vi/9KsnFWejpQg/default.jpg)
![Security Industry Call-to-Action: We Need a Cloud Vulnerability Database](https://i.ytimg.com/vi/JEA_Zgi8Tjg/default.jpg)
![Black Hat USA 2013 - Lessons from Surviving a 300Gbps Denial of Service Attack](https://i.ytimg.com/vi/w04ZAXftQ_Y/default.jpg)
![CQTools: The New Ultimate Hacking Toolkit](https://i.ytimg.com/vi/MZ0nSO0WOJg/default.jpg)
![Computrace Backdoor Revisited](https://i.ytimg.com/vi/AKmNf-JmjKQ/default.jpg)
![Side-Channel Attacks on Everyday Applications](https://i.ytimg.com/vi/GPwNFrpd1KU/default.jpg)