Twitter | Pretraživanje | |
Alex Tereshkin
Poked firmware before it was cool
36
Tweetovi
98
Pratim
216
Osobe koje vas prate
Tweetovi
Alex Tereshkin proslijedio/la je tweet
Alex Matrosov 20. sij
I'm thrilled to announce, I will be a keynote speaker for ! Stay tuned for more details ;-)
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin 6. stu
Happy to join a great team at Nvidia!
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Xeno Kovah 7. lis
Thread: And now for the update to the timeline for the last year or so of firmware security stuff I am usually more focused on...
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Nikolaj Schlej 24. srp
It took us some serious time, but I've finally got all required official approvals to continue working on UEFITool, huge props to for making that happen. My first commit since 2016, adding ME region parser and extended ucode header parser:
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Alex Matrosov 1. srp
My keynote slides "The Advanced Threats Evolution: REsearchers Arm Race" from released! The golden age of FW/HW implants is happening right now!! Honestly preparing these slides took more time than my usual research presentations :-)
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Mark Ermolov 23. svi
Intel still didn't learn the lesson: without firmware downgrade prevention the fixes in CSME firmware can't protect and in some cases actually do nothing
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Alex Matrosov 26. tra
I will be giving the keynote at ! As much as modern OS evolving in the direction of building more mitigations to increase the cost of exploitation and malware persistent techniques, as much advanced threat actors looking more for the next lowest level of persistent.
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Alex Matrosov 29. ožu
My slides "Attacking Hardware Root of Trust from UEFI Firmware" released. More details about bypass Boot Guard implementation on Lenovo Thinkpad's coming after and . Enjoy evil SMI handlers over WMI and stay tuned!
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Mark Ermolov 29. ožu
Intel VISA demo: extracting one's of Intel SoCs security fuses (debug root key for TPM, ME file system, Intel IPT and others):
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Alex Matrosov 13. pro 2018.
Happy to announce all the chapters of now available in Early Access (~600 p). 4 years of writing/rewriting. The book almost a double the size from the original proposal (rootkits/bootkits, UEFI threats and modern forensics) Thx and !!
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin 28. sij 2019.
I'll be doing System Management Mode Rootkits training at conference in Singapore (March 24th-27th), most likely for the last time. Everyone interested in firmware security is welcome!
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Qubes OS 27. pro 2018.
We're having an "Introduction to Qubes OS" session this Saturday at the 35th Chaos Communication Congress in Leipzig: We'll start with the absolute basics and build from there; no prior knowledge needed! All are welcome!
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Trammell Hudson ⚙ 27. pro 2018.
Tune in to the livestream twenty minutes from now (22:50) for "Modchips of the State", my thoughts on the technical feasibility of the Supermicro hardware implant story.
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Maxim Goryachy 28. stu 2018.
“The Phantom Menace: Intel ME Manufacturing Mode” slides: team thanks for the good time!
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Joanna Rutkowska 23. stu 2018.
Thank you Marek for all the work on Qubes OS you have done over the last 7 years and may the Force be with you!
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Maxim Goryachy 2. lis 2018.
Our new paper "Intel ME Manufacturing Mode: obscured dangers" about SPI write-protection bypass in Apple MacBook. [ru] [en]
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Yuriy Bulygin 1. lis 2018.
New blog if you want to know how to protect from implants like the one used by
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Mark Ermolov 27. kol 2018.
Ready to uncover Intel ME background? Use our PoC to activate JTAG and dump ME ROM
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Joseph Bialek 14. kol 2018.
Some hardcore Hyper-V hypervisor engineering work to mitigate nasty CPU side channel bugs. Coming up with performant solutions to these types of problems is not easy!
Reply Retweet Označi sa "sviđa mi se"
Alex Tereshkin proslijedio/la je tweet
Ryan Naraine 14. kol 2018.
Reply Retweet Označi sa "sviđa mi se"