Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Boot2root - Auditing Boot Loaders by Example

media.ccc.de via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the vulnerabilities in secure boot chains through this comprehensive conference talk from the 36th Chaos Communication Congress (36C3). Dive into an in-depth audit of commonly used boot loaders, examining the extensive attack surface they present. Discover surprising weaknesses in hardening and defense-in-depth strategies. Follow along as experts Ilja van Sprundel and Joseph Tartaro dissect various attack vectors, from remote exploits via network protocol parsers to local filesystem vulnerabilities and BUS parsing issues. Gain valuable insights into the realistic threats facing secure boot implementations and learn how to identify and mitigate common mistakes in boot loader security.

Syllabus

36C3 - Boot2root

Taught by

media.ccc.de

Reviews

Start your review of Boot2root - Auditing Boot Loaders by Example

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.