Static Analysis-Based Recovery of Service Function Calls in UEFI Firmware
Ekoparty Security Conference via YouTube
Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
The Fastest Way to Become a Backend Developer Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a conference talk from Ekoparty Security Conference that delves into the automated recovery of service calls and EFI type information in UEFI firmware. Discover how this innovative tool simplifies the process of reversing UEFI firmware, making it appear more like original source code. Learn how this approach can significantly reduce the need for extensive background knowledge in firmware and hardware, potentially accelerating vulnerability hunting. Gain insights into the static analysis techniques used and their implications for firmware security research. This 47-minute presentation is ideal for cybersecurity professionals, firmware analysts, and anyone interested in UEFI firmware vulnerabilities and reverse engineering techniques.
Syllabus
#Eko2020 Main Track | Static analysis-based recovery of service function calls in UEFI firmware
Taught by
Ekoparty Security Conference