Power BI Fundamentals - Create visualizations and dashboards from scratch
You’re only 3 weeks away from a new language
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This presentation explores the critical vulnerabilities in embedded device boot sequences that compromise security chains of trust. Discover how bootloader vulnerabilities can be exploited through physical or remote access, allowing attackers to achieve undetectable arbitrary code execution that persists through recovery attempts. Learn about real-world examples including a network device running legacy grub 0.97 and the "RootBlock" vulnerability that compromised Dell iDRAC9's secure boot chain. The talk examines the identification, exploitation, and reporting process for these vulnerabilities, presents a survey of popular bootloaders' attack surfaces, and discusses industry-wide solutions needed to address these security gaps. Since bootloaders are often shared across different devices and vendors, this knowledge provides an opportunity to improve security across the embedded device ecosystem.
Syllabus
The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them
Taught by
Black Hat