Star 0

Abstract

You wanted to explore deep corners of your system but didn't know how?
System boot firmware, ROMs on expansion cards, I/O devices and their
firmware, microprocessors, embedded controllers, memory devices, low-level
hardware interfaces, virtualization and hypervisors. You could discover if
any of these have known vulnerabilities, configured insecurely or even
discover new vulnerabilities and develop proof-of-concept exploits to test
these vulnerabilities. Ultimately, you can verify security state of platform
components of your system and how effective are the platform security
defenses: hardware or virtualization based TEE, secure or trusted boot,
firmware anti-tampering mechanisms, hypervisor based isolation... Or maybe
you just want to explore hardware and firmware components your system has.

Slides