C3Subtitles: 36c3: Boot2root
back

Boot2root

Auditing Boot Loaders by Example

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
01:02:13
Language
English
Abstract
The Achilles heel of [your secure device] is the secure boot chain. In this presentation we will show our results from auditing commonly used boot loaders and walk through the attack surface you open yourself up to. You would be surprised at how much attack surface exists when hardening and defense in depth is ignored. From remote attack surface via network protocol parsers to local filesystems and various BUS parsing, we will walk through the common mistakes we've seen by example and showcase how realistic it is for your product's secure boot chain to be compromised.

No description available.

Talk ID
10706
Event:
36c3
Day
3
Room
Borg
Start
6:50 p.m.
Duration
01:00:00
Track
Security
Type of
lecture
Speaker
Joseph Tartaro
Ilja van Sprundel
0.0% Checking done0.0%
0.0% Syncing done0.0%
13.4% Transcribing done13.4%
86.6% Nothing done yet86.6%

English: Transcribed until

Last revision: 7 months, 2 weeks ago