Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This presentation explores the critical vulnerabilities in embedded device boot sequences that compromise security chains of trust. Discover how bootloader vulnerabilities can be exploited through physical or remote access, allowing attackers to achieve undetectable arbitrary code execution that persists through recovery attempts. Learn about real-world examples including a network device running legacy grub 0.97 and the "RootBlock" vulnerability that compromised Dell iDRAC9's secure boot chain. The talk examines the identification, exploitation, and reporting process for these vulnerabilities, presents a survey of popular bootloaders' attack surfaces, and discusses industry-wide solutions needed to address these security gaps. Since bootloaders are often shared across different devices and vendors, this knowledge provides an opportunity to improve security across the embedded device ecosystem.

Syllabus

The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them

Taught by

Black Hat

Reviews

Start your review of The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.