Presented by:

In this presentation, we will discuss how to detect and protect against BIOS and UEFI firmware security threats on Linux systems, using open source tools. Most still only do security testing at userspace and kernelspace, not in any detail at hardware and firmware level. Attacks at the firmware level exist, called "bootkits". Bootkits are scary. If you don't look for them, you won't find them. Most people don't know how to look for them. Our goal is to help improve enterprise defensive firmware security by helping people understand how to look for bootkits. We'll show the latest open source tools and malware research of the industry experts -- Intel, LegbaCore, Invisible Things Lab, Mitre, NIST, etc. -- and how you can start using today to help defend your enterprise at the silicon and firmware levels.

Audience: The audience are enterprise system administrators and security teams responsible for defending BIOS- or UEFI-based Linux systems on Intel processors.

Requirements: Core understanding of PC hardware architecture needed. Basic use of Python (CPython 2.7x) is interpreter needed; the ability to write Python code is useful to write custom tests. Basic shell scripting skills needed; given the MS-DOS-like nature of UEFI Shell, knowledge of command.com/cmd.exe batch files is useful, beyond Bash scripting.

Date:
2015 October 23 - 10:00
Duration:
50 min
Room:
Room 3184
Conference:
SeaGL 2015
Language:
Track:
Difficulty:
Hard

Happening at the same time:

  1. Exhibitor Hall Day One
  2. Start Time:
    2015 October 23 09:00

    Room:
    Room 1110

  3. Hosting Events that the Whole Community Loves
  4. Start Time:
    2015 October 23 10:00

    Room:
    Room 3183

  5. The Cloud Sucks, Use the Cloud
  6. Start Time:
    2015 October 23 10:00

    Room:
    Room 3179