Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller

Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller

Breaking Through Another Side Bypassing Firmware Security Boundaries from Embedded ControllerПодробнее

Breaking Through Another Side Bypassing Firmware Security Boundaries from Embedded Controller

OffensiveCon19 - Alex Matrosov - Attacking Hardware Root of Trust from UEFI FirmwareПодробнее

OffensiveCon19 - Alex Matrosov - Attacking Hardware Root of Trust from UEFI Firmware

Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡Подробнее

Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡

Don't Do This At HomeПодробнее

Don't Do This At Home

Bypassing Secure Boot Using Fault InjectionПодробнее

Bypassing Secure Boot Using Fault Injection

#HITBGSEC D2: Bypassing Hardware-Based Trusted Boot Through x86 Downgrade - Alexander ErmolovПодробнее

#HITBGSEC D2: Bypassing Hardware-Based Trusted Boot Through x86 Downgrade - Alexander Ermolov

#HITBLockdown D2 - Virtual Lab - Firmware Hacking With Ghidra - Thomas Roth & Dmitry NedospasovПодробнее

#HITBLockdown D2 - Virtual Lab - Firmware Hacking With Ghidra - Thomas Roth & Dmitry Nedospasov

Betraying the BIOS: Where the Guardians of the BIOS are FailingПодробнее

Betraying the BIOS: Where the Guardians of the BIOS are Failing

Raiden Glitching FrameworkПодробнее

Raiden Glitching Framework