A Dark Side of UEFI: Cross-Silicon Exploitation

A Dark Side of UEFI: Cross-Silicon Exploitation

OffensiveCon via YouTube Direct link

Candor

22 of 31

22 of 31

Candor

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

A Dark Side of UEFI: Cross-Silicon Exploitation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Arm perspective on UEFI
  3. 3 Microsoft Windows Development Kit 2023
  4. 4 File Systems
  5. 5 BIOS Region
  6. 6 Platform Configuration
  7. 7 UART Redirection
  8. 8 Boot Order
  9. 9 Hypervisor
  10. 10 Environment variables
  11. 11 Environment Arm
  12. 12 Automation
  13. 13 Vulnerabilities
  14. 14 Research Approach
  15. 15 Memory Leak Vulnerability
  16. 16 Proof of Concept
  17. 17 Demo
  18. 18 Stackable Overflows
  19. 19 Second Stack Overflow
  20. 20 Third Stack Overflow Explanation
  21. 21 UEFI Depth Protection
  22. 22 Candor
  23. 23 Building the Rope
  24. 24 Project UEFI Rust
  25. 25 Demonstration
  26. 26 Triggerable
  27. 27 TrustZone
  28. 28 The Trust Zone
  29. 29 Executive Weaknesses
  30. 30 SM ROM Dump
  31. 31 Alex Ermolov

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.