Twitter | Pretraživanje | |
Alex Matrosov
I wrote a blog post "Breaking Through Another Side: Bypassing Firmware Security Boundaries". It's a first part of the series based on our research with Alexandre Gazet. HW/FW Security != Summary of all Security Boundaries
This blog post is the first in the series about my joint Black Hat research “Breaking Through Another Side: Bypassing Firmware Security…
Medium Medium @Medium
Reply Retweet Označi sa "sviđa mi se" More
vulncode 9. stu
Odgovor korisniku/ci @matrosov
Awesome write up!
Reply Retweet Označi sa "sviđa mi se"
Paul Depraz 19. kol
Odgovor korisniku/ci @matrosov
The pictures on the medium post are broken
Reply Retweet Označi sa "sviđa mi se"
Sumit Kumar 13. sij
Odgovor korisniku/ci @matrosov
Wonderful post. Good info. Been working on device Fw update over UEFI & ensuring security at FW level w.r.t specs PlatformFwResiliency.NIST.SP.800–193, USB Type-C authentication. But as you have mentioned its not good enough. We should look at the system as a whole.
Reply Retweet Označi sa "sviđa mi se"