Breaking Secure Bootloaders

Описание к видео Breaking Secure Bootloaders

Bootloaders often use signature verification mechanisms in order to protect a device from executing malicious software. This talk aims to outline actionable weaknesses in modern bootloaders which allow attackers to deploy unsigned code, despite these protection mechanisms...

By: Christopher Wade

Full Abstract & Presentation Materials:
https://www.blackhat.com/us-21/briefi...

Комментарии

Информация по комментариям в разработке