Get 50% Off Udacity Nanodegrees — Code CC50
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a 37-minute Black Hat conference talk that delves into critical vulnerabilities within AMD's SEV-SNP technology's firmware implementation on the Platform Security Processor. Learn about novel exploitation techniques that can lead to complete compromise of confidentiality, allowing attackers to decrypt guest memory on affected systems. Discover how these firmware vulnerabilities can potentially enable attackers to modify encrypted memory contents, resulting in complete loss of integrity for running guest systems. Security researcher Tom Dohrmann demonstrates how modern Trusted Execution Environments (TEEs) can be compromised through their reliance on privileged firmware for implementing complex features, coordinating hardware components, and establishing roots of trust.
Syllabus
All Your Secrets Belong to Us: Leveraging Firmware Bugs to Break TEEs
Taught by
Black Hat