The Platform Security Summit for 2019 will be in Redmond, WA (West Coast). Last year it was in Fairfax, VA (East Coast). I’m guessing there’ll be more talks from Microsoft this year. 🙂
Sitel Amin of ARM has a new blog post about ARM-based mobile security technologies:
We are in the middle of a security arms race on devices. It is a never-ending cycle where hackers will think of new ways to find vulnerabilities and where we in the industry constantly try to stay one step ahead with innovations that lead to better and stronger security. […]
Slides for my talk with @BenBlaxill "PicoDMA: DMA Attacks at Your Fingertips" are up on speakerdeck (and should be on BH site as well): https://t.co/baoilBMWdV Thanks to all that attended and @UlfFrisk and @securelyfitz for inspirational research in this space
Slides for our #BHUSA2019 talk "Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller" by Alex Gazet and @matrosov at https://t.co/jEvZ1afwAt
Looking for Briefings Slides and White Papers? Presentation materials provided by speakers will be made available at the end of each day on the Black Hat website. Presentations can be downloaded here: https://t.co/zPkU6TaNIS
oreboot is a downstream fork of coreboot, i.e. oreboot is coreboot without ‘c’. oreboot will only target truly open systems requiring no binary blobs. oreboot is mostly written in Rust, with assembly where needed. oreboot currently only plans to support LinuxBoot payloads.
Hmm, I can’t find the source code, just a blog and a PDF. Maybe I missed it…
[…] To help security researchers, we have developed LLDBFuzzer, which is based on the LLVM Project’s next-generation debugger called Low Level Debugger (LLDB). We tested LLDBFuzzer on a MacPro’s AMD graphic drivers. These drivers are used to accelerate and optimize 2D, 3D and video rendering, and they contain many interfaces that the user space can access; these features make them a good target for LLDBFuzzer. LLDB is not suitable for debugging low-level kernel components, but it can debug almost all the kernel extensions and XNU codes after the required hardware is operational. Based on these features, this is the novel fuzzing architecture of LLDBFuzzer […]
I have written a new utility called Dell PFS BIOS Extractor. Basically a python version of @NikolajSchlej PFSExtractor-RS with a few extra features & blink. You can find it at my Various BIOS Utilities for Modding/Research repository, BSD licensed. https://t.co/8CSPFyyoBGpic.twitter.com/WddjxCFXLv
The main idea of FwAnalyzer is to provide a tool for rapid analysis of filesystem images as part of a firmware security Q&A check suite. FwAnalyzer takes a configuration file that defines various rules for files and directories and runs the configured checks against a given filesystem image. The output of FwAnalyzer is a report, which contains the list of files that violate any of the rules specified in the configuration. The report further contains meta information about the filesystem image and, if configured, information extracted from files within the analyzed filesystem. The report is formatted using JSON so it can be easily integrated as a step in a larger analysis.
AMD updated: “AMD64 Architecture Programmer’s Manual Volume 2: System Programming” in July 2019. The last update was back in September 2018. Changes: 3.31 Added CLWB and WBNOINVD details. Clarified FP error pointer save/restore behavior. Corrected description of APIC Software Enable functionality. Clarified canonical address checking behavior. Clarified fault generation for instructions that cross page or segment boundaries.
IoT device Firmware Reverse Engineering is a process to understand the device architecture, functionality and vulnerabilities present in the device incorporating different methods. Firmware is a piece of code written for specific hardware to perform different operations and control the device. In this blog, we will learn how to access the file system of a TP-Link Router TL-WR841N.[…]
[…]uniFuzzer is a fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer. Currently it supports fuzzing 32-bits LSB ELF files on ARM/MIPS, which are usually seen in IoT devices.[…]
Just released version 3.0 in time for #BHUSA. Major changes include – addition of PDF reports – new extraction concept that also works standalone – Plugins can now also be run on single fileshttps://t.co/GzGLqrBe6u
A crash course into 8086/8088 assembler programming, in an easy way with practice at each step. You will learn how to use the registers, move data, do arithmetic, and handle text and graphics. You can run these programs on any PC machine and no program exceeds 512 bytes of executable code! The example programs include:
You must be logged in to post a comment.