Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
This 34-minute Black Hat conference talk explores the underexamined threat of backdoors in UEFI Option ROM (OROM). Discover how OROM backdoors differ from previous research that only used OROM for persistence or lateral movement. Learn about the specific capabilities and infection scenarios of dedicated OROM backdoors, with demonstrations of three novel proof-of-concept backdoors targeting Windows systems. Examine advanced evasion techniques including C2 server communication during boot, malicious code execution at kernel and userland levels through runtime DXE drivers, concealment of malicious tasks during boot, and bypassing security controls using partial identity mapping. Gain insights into defensive strategies against these sophisticated threats and understand the research initiatives needed to protect systems from UEFI OROM backdoors. Presented by Kazuki Matsuo, Security Researcher from Waseda University and FFRI Security.