Star 0

Abstract

Despite numerous conference publications and revelations in the past year showing attacker's interest and capability in BIOS-level attacks, most enterprises are content to leave their firmware un-inspected. This talk shows concrete strategies to check for BIOS vulnerabilities and integrity checking firmware, to minimize the attacker’s ability to sit on your network undetected for years at a time.