Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller

Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller

Black Hat via YouTube Direct link

Hardware Security Boundaries

2 of 20

2 of 20

Hardware Security Boundaries

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Hardware Security Boundaries
  3. 3 Methodology
  4. 4 EC firmware update process
  5. 5 Impact of EC update auth bypass
  6. 6 Lenovo Thinkpad EC update header
  7. 7 Lenovo Thinkpad EC update process
  8. 8 Boot Guard saves the day?
  9. 9 Lenovo Thinkpad EC signature check
  10. 10 Lenovo disclosure timeline
  11. 11 EC take-aways
  12. 12 Intel BIOS Guard in a nutshell
  13. 13 What is Intel BIOS Guard?
  14. 14 Lenovo Thinkpad PFAT update process
  15. 15 BIOS Guard hardware support
  16. 16 BIOS Guard ACM execution flow
  17. 17 BIOS Guard Directory
  18. 18 BIOS Guard Platform Data Table
  19. 19 BIOS Guard Update Package
  20. 20 Signed vs unsigned operations with BIOS Guard script

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.