Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

A Dark Side of UEFI: Cross-Silicon Exploitation

OffensiveCon via YouTube

Overview

Explore a comprehensive analysis of UEFI vulnerabilities and cross-silicon exploitation techniques in this OffensiveCon23 conference talk. Delve into the Arm perspective on UEFI, examining file systems, BIOS regions, platform configurations, and boot order processes. Investigate UART redirection, hypervisor environments, and automation techniques. Learn about memory leak vulnerabilities, stackable overflows, and UEFI depth protection. Discover the intricacies of Project UEFI Rust and its implications for security. Gain insights into TrustZone weaknesses and SM ROM dump techniques. Presented by Alex Matrosov and Alex Ermolov, this talk offers a deep dive into the dark side of UEFI and its potential for cross-silicon exploitation.

Syllabus

Introduction
Arm perspective on UEFI
Microsoft Windows Development Kit 2023
File Systems
BIOS Region
Platform Configuration
UART Redirection
Boot Order
Hypervisor
Environment variables
Environment Arm
Automation
Vulnerabilities
Research Approach
Memory Leak Vulnerability
Proof of Concept
Demo
Stackable Overflows
Second Stack Overflow
Third Stack Overflow Explanation
UEFI Depth Protection
Candor
Building the Rope
Project UEFI Rust
Demonstration
Triggerable
TrustZone
The Trust Zone
Executive Weaknesses
SM ROM Dump
Alex Ermolov

Taught by

OffensiveCon

Reviews

Start your review of A Dark Side of UEFI: Cross-Silicon Exploitation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.