|
Alex Tereshkin
@
AlexTereshkin
|
|
Poked firmware before it was cool
|
|
|
36
Tweetovi
|
98
Pratim
|
216
Osobe koje vas prate
|
| Tweetovi |
| Alex Tereshkin proslijedio/la je tweet | ||
|
Alex Matrosov
@matrosov
|
20. sij |
|
I'm thrilled to announce, I will be a keynote speaker for #HITB2020SIN! Stay tuned for more details ;-) twitter.com/HITBSecConf/st…
|
||
|
|
||
|
Alex Tereshkin
@AlexTereshkin
|
6. stu |
|
Happy to join a great team at Nvidia! twitter.com/matrosov/statu…
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Xeno Kovah
@XenoKovah
|
7. lis |
|
Thread: And now for the update to the timeline timeglider.com/timeline/5ca2d… for the last year or so of firmware security stuff I am usually more focused on...
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Nikolaj Schlej
@NikolajSchlej
|
24. srp |
|
It took us some serious time, but I've finally got all required official approvals to continue working on UEFITool, huge props to @radian for making that happen.
My first commit since 2016, adding ME region parser and extended ucode header parser: github.com/LongSoft/UEFIT…
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Alex Matrosov
@matrosov
|
1. srp |
|
My keynote slides "The Advanced Threats Evolution: REsearchers Arm Race" from #OFFZONE released! The golden age of FW/HW implants is happening right now!!
Honestly preparing these slides took more time than my usual research presentations :-) github.com/REhints/Public… pic.twitter.com/kR2tJ36k2T
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Mark Ermolov
@_markel___
|
23. svi |
|
Intel still didn't learn the lesson: without firmware downgrade prevention the fixes in CSME firmware can't protect and in some cases actually do nothing pic.twitter.com/iRrzJXWgFH
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Alex Matrosov
@matrosov
|
26. tra |
|
I will be giving the keynote at #offzone2019! As much as modern OS evolving in the direction of building more mitigations to increase the cost of exploitation and malware persistent techniques, as much advanced threat actors looking more for the next lowest level of persistent. twitter.com/offzone_moscow…
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Alex Matrosov
@matrosov
|
29. ožu |
|
My #offensivecon19 slides "Attacking Hardware Root of Trust from UEFI Firmware" released. More details about bypass Boot Guard implementation on Lenovo Thinkpad's coming after #BHASIA and #OPCDE2019. Enjoy evil SMI handlers over WMI and stay tuned! github.com/REhints/Public…
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Mark Ermolov
@_markel___
|
29. ožu |
|
Intel VISA demo: extracting one's of Intel SoCs security fuses (debug root key for TPM, ME file system, Intel IPT and others): pic.twitter.com/gD4L7ndKFC
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Alex Matrosov
@matrosov
|
13. pro 2018. |
|
Happy to announce all the chapters of bootkits.io now available in Early Access (~600 p). 4 years of writing/rewriting. The book almost a double the size from the original proposal (rootkits/bootkits, UEFI threats and modern forensics) Thx @billpollock and @nostarch!!
|
||
|
|
||
|
Alex Tereshkin
@AlexTereshkin
|
28. sij 2019. |
|
I'll be doing System Management Mode Rootkits training at @sghackcon conference in Singapore (March 24th-27th), most likely for the last time. Everyone interested in firmware security is welcome!
#SHACK
coseinc.com/shack/index.ph…
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Qubes OS
@QubesOS
|
27. pro 2018. |
|
We're having an
"Introduction to Qubes OS" session this Saturday at the 35th Chaos Communication Congress in Leipzig:
events.ccc.de/congress/2018/…
We'll start with the absolute basics and build from there; no prior knowledge needed! All are welcome! #CCC #35C3
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Trammell Hudson ⚙
@qrs
|
27. pro 2018. |
|
Tune in to the #35c3 livestream twenty minutes from now (22:50) for "Modchips of the State", my thoughts on the technical feasibility of the Supermicro hardware implant story. streaming.media.ccc.de/35c3/hallb pic.twitter.com/MO0D7g1d72
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Maxim Goryachy
@h0t_max
|
28. stu 2018. |
|
“The Phantom Menace: Intel ME Manufacturing Mode” slides:
conference.hitb.org/hitbsecconf201…
@HITBSecConf team thanks for the good time!
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Joanna Rutkowska
@rootkovska
|
23. stu 2018. |
|
Thank you Marek for all the work on Qubes OS you have done over the last 7 years and may the Force be with you! twitter.com/QubesOS/status…
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Maxim Goryachy
@h0t_max
|
2. lis 2018. |
|
Our new paper "Intel ME Manufacturing Mode: obscured dangers" about SPI write-protection bypass in Apple MacBook. habr.com/company/pt/blo… [ru]
blog.ptsecurity.com/2018/10/intel-… [en]
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Yuriy Bulygin
@c7zero
|
1. lis 2018. |
|
New blog if you want to know how to protect from #UEFI implants like the one used by #LoJax twitter.com/eclypsium/stat…
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Mark Ermolov
@_markel___
|
27. kol 2018. |
|
Ready to uncover Intel ME background? Use our PoC to activate JTAG and dump ME ROM github.com/ptresearch/Int…
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Joseph Bialek
@JosephBialek
|
14. kol 2018. |
|
Some hardcore Hyper-V hypervisor engineering work to mitigate nasty CPU side channel bugs. Coming up with performant solutions to these types of problems is not easy! blogs.technet.microsoft.com/virtualization…
|
||
|
|
||
| Alex Tereshkin proslijedio/la je tweet | ||
|
Ryan Naraine
@ryanaraine
|
14. kol 2018. |
|
- Foreshadow: foreshadowattack.eu
- Intel response: intel.com/content/www/us…
- Microsoft response: blogs.technet.microsoft.com/srd/2018/08/10…
|
||
|
|
||