OSFC 2019 - Hardening Firmware Components with Host-based Analysis Tools
This talk was held at 9elements Cyber Security's Open Source Firmware Conference in Silicon Valley.
Presenter: Brian Richardson
Abstract:
Sophisticated attackers are targeting system firmware in search of new exploits. Firmware is normally subjected to rigorous integration testing, but how do developers perform more intensive unit testing to reduce errors prior to system integration?
Host-based Firmware Analyzer was recently contributed to TianoCore, an open source community for UEFI development. This is a tool for firmware component analysis with a focus on fuzzing & symbolic testing of firmware components. Host-based methods isolate firmware components in the developer’s OS environment and leverages existing open source analysis tools (ex: AFL, Peach, KLEE).
This session provides an overview of the Linux-based tool and how it is used to improve efficiency of firmware security test cases.
WEBSITE: https://osfc.io
TWITTER: https://twitter.com/osfc_io
FACEBOOK: https://facebook.com/osfc.io
PAPER: https://2019.osfc.io/talks/hardening-firmware-components-with-host-based-analysis-tools.html
ORGANIZER: https://9esec.io
Видео OSFC 2019 - Hardening Firmware Components with Host-based Analysis Tools канала Open Source Firmware Conference
Presenter: Brian Richardson
Abstract:
Sophisticated attackers are targeting system firmware in search of new exploits. Firmware is normally subjected to rigorous integration testing, but how do developers perform more intensive unit testing to reduce errors prior to system integration?
Host-based Firmware Analyzer was recently contributed to TianoCore, an open source community for UEFI development. This is a tool for firmware component analysis with a focus on fuzzing & symbolic testing of firmware components. Host-based methods isolate firmware components in the developer’s OS environment and leverages existing open source analysis tools (ex: AFL, Peach, KLEE).
This session provides an overview of the Linux-based tool and how it is used to improve efficiency of firmware security test cases.
WEBSITE: https://osfc.io
TWITTER: https://twitter.com/osfc_io
FACEBOOK: https://facebook.com/osfc.io
PAPER: https://2019.osfc.io/talks/hardening-firmware-components-with-host-based-analysis-tools.html
ORGANIZER: https://9esec.io
Видео OSFC 2019 - Hardening Firmware Components with Host-based Analysis Tools канала Open Source Firmware Conference
Показать
Комментарии отсутствуют
Информация о видео
2 декабря 2019 г. 20:06:12
00:38:41
Другие видео канала
OSFC 2018 - Arm Trusted Firmware for coreboot developers | Julius WernerOSFC 2019 - RISC-V - SBI on Litex FPGA SoCs and other hardcoresOSFC 2019 - Slim Bootloader Turns One - Updates, Key Learning & What's NextOSFC 2019 - creating an affordable alternative to SPI flash emulators for firmware developmentOSFC 2018 - Journey from Closed to Open | Liam GridwoodOSFC 2019 - Server Base Manageability Guide for SBSA compliant Arm (aarch64) servers.OSFC 2019 - Minimum Platform: Open Source UEFI Firmware for Intel Based PlatformsOSFC 2019 - Common BMC vulnerabilities and how to avoid repeating themOSFC 2018 - A tale of reusability in coreboot | Furquan ShaikhOSFC 2019 - Start trusting Your BIOS - SRTM with vboot, TPM and permanent flash protectionOSFC 2019 - linuxboot: everything you need with the 'cpu' commandOSFC 2019 - State of coreboot on Lenovo ThinkpadsOSFC 2018 - Linuxboot Continuous Integration | Jean Marie VerdunOSFC 2019 - Adaptation of AMD Reference Firmware to coreboot© Using FSP 2.0OSFC 2018 - How to enable AMD IOMMU in coreboot | Piotr KrólOSFC 2018 - Petitboot: Four years of Linux as a Bootloader | Samuel Mendoza JonasOSFC 2019 - The future of firmware verification in corebootOSFC 2019 - Debugging Intel Firmware using DCI & USB 3.0OSFC 2019 - Multiprocessor Initialization in CorebootOSFC - U-Boot with Chrome OS and firmware packaging | Simon Glass