Overview
Explore new vulnerabilities in System Management Mode (SMM) affecting Coreboot and UEFI-based systems in this conference talk from Recon 2017 Brussels. Delve into an entirely new class of vulnerabilities in SMI handlers, caused by incorrect trust assumptions between firmware and hardware. Learn about the impact of these issues on various system firmware types and discover potential mitigation techniques. Gain insights into the researchers' previous findings on UEFI-based firmware vulnerabilities and their consequences, including attacks on hypervisors and bypassing Windows 10 security protections. Understand the changes implemented in OS-SMM communication and the introduction of Windows SMM Security Mitigations ACPI Table (WSMT). Get introduced to a new module for the open-source CHIPSEC framework, designed to automatically detect these vulnerabilities on running systems. Benefit from the expertise of Yuriy Bulygin, lead of the Advanced Threat Research team at Intel Security, and Oleksandr Bazhaniuk, a security researcher specializing in low-level hardware and BIOS/UEFI security.
Syllabus
recon 2017 Brussels-Baring the system:New vulnerabilities in SMM of Coreboot and UEFI based systems
Taught by
Recon Conference