Platform Security Summit ‏ 2019 date set

The Platform Security Summit for 2019 will be in Redmond, WA (West Coast). Last year it was in Fairfax, VA (East Coast). I’m guessing there’ll be more talks from Microsoft this year. 🙂

The web site still talks about the 2018 event, the above tweet is the only “CFP” I have yet seen for the 2019 event.

Videos from last year:

https://www.platformsecuritysummit.com/2018/videos/

ARM: The Security Arms Race on Devices

Sitel Amin of ARM has a new blog post about ARM-based mobile security technologies:

We are in the middle of a security arms race on devices. It is a never-ending cycle where hackers will think of new ways to find vulnerabilities and where we in the industry constantly try to stay one step ahead with innovations that lead to better and stronger security. […]

https://community.arm.com/developer/ip-products/security/b/security-ip-blog/posts/security-on-devices

BlackHat 2019 USA presentations starting to become available…

Some BlackHat presentations are starting to become available to the public:

https://www.blackhat.com/us-19/briefings/schedule/

Not yet on: https://www.blackhat.com/html/archives.html

Android_Universal: Android Universal Boot Rooting Toolkit

Boot to root 🙂 Converts stock boot images and adds hidden root (accessible via netcat session), patches selinux and adds adb. Tested with Android 4.x – 9.x.

https://github.com/bkerler/android_universal

oreboot: a fork of coreboot, with C removed, written in Rust

https://github.com/oreboot/oreboot

oreboot is a downstream fork of coreboot, i.e. oreboot is coreboot without ‘c’. oreboot will only target truly open systems requiring no binary blobs. oreboot is mostly written in Rust, with assembly where needed. oreboot currently only plans to support LinuxBoot payloads.

LLDBFuzzer: Debugging and Fuzzing the Apple Kernel with LLDB Script

Hmm, I can’t find the source code, just a blog and a PDF. Maybe I missed it…

[…] To help security researchers, we have developed LLDBFuzzer, which is based on the LLVM Project’s next-generation debugger called Low Level Debugger (LLDB). We tested LLDBFuzzer on a MacPro’s AMD graphic drivers. These drivers are used to accelerate and optimize 2D, 3D and video rendering, and they contain many interfaces that the user space can access; these features make them a good target for LLDBFuzzer. LLDB is not suitable for debugging low-level kernel components, but it can debug almost all the kernel extensions and XNU codes after the required hardware is operational. Based on these features, this is the novel fuzzing architecture of LLDBFuzzer […]

https://blog.trendmicro.com/trendlabs-security-intelligence/lldbfuzzer-debugging-and-fuzzing-the-apple-kernel-with-lldb-script/

Figure. 1

Dell_PFS_Extract.py: Dell PFS BIOS Extractor

Plato has written a new tool to his collection of BIOS Utilities:

https://github.com/platomav/BIOSUtilities

https://github.com/platomav/BIOSUtilities/tree/master/Dell%20PFS%20BIOS%20Extractor

Inspired from https://github.com/LongSoft/PFSExtractor-RS by Nikolaj Schlej

FWAnalyzer: a tool to analyze filesystem images

Re: https://firmwaresecurity.com/2019/03/27/automating-firmware-security-with-fwanalyzer/

The main idea of FwAnalyzer is to provide a tool for rapid analysis of filesystem images as part of a firmware security Q&A check suite. FwAnalyzer takes a configuration file that defines various rules for files and directories and runs the configured checks against a given filesystem image. The output of FwAnalyzer is a report, which contains the list of files that violate any of the rules specified in the configuration. The report further contains meta information about the filesystem image and, if configured, information extracted from files within the analyzed filesystem. The report is formatted using JSON so it can be easily integrated as a step in a larger analysis.

https://github.com/cruise-automation/fwanalyzer

https://www.fwanalyzer.io/

fwanalyzer

AMD System Programming manual updated

AMD updated: “AMD64 Architecture Programmer’s Manual Volume 2: System Programming” in July 2019. The last update was back in September 2018. Changes:
3.31 Added CLWB and WBNOINVD details.
Clarified FP error pointer save/restore behavior.
Corrected description of APIC Software Enable functionality.
Clarified canonical address checking behavior.
Clarified fault generation for instructions that cross page or segment boundaries.

Click to access 24593.pdf

SecureLayer7: How to Start IoT device Firmware Reverse Engineering

IoT device Firmware Reverse Engineering is a process to understand the device architecture, functionality and vulnerabilities present in the device incorporating different methods. Firmware is a piece of code written for specific hardware to perform different operations and control the device. In this blog, we will learn how to access the file system of a TP-Link Router TL-WR841N.[…]

uniFuzzer: fuzzer based on Unicorn and LibFuzzer

[…]uniFuzzer is a fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer. Currently it supports fuzzing 32-bits LSB ELF files on ARM/MIPS, which are usually seen in IoT devices.[…]

https://github.com/rk700/uniFuzzer

FACT_core (Firmware Analysis and Comparison Tool) 3.0 released

https://github.com/fkie-cad/FACT_core/releases/tag/3.0

https://github.com/fkie-cad/FACT_core

https://www.blackhat.com/us-19/arsenal/schedule/index.html#fact–firmware-analysis-and-comparison-tool-15216

New BIOS book: Programming Boot Sector Games


By Oscar Toledo Gutierrez

A crash course into 8086/8088 assembler programming, in an easy way with practice at each step. You will learn how to use the registers, move data, do arithmetic, and handle text and graphics. You can run these programs on any PC machine and no program exceeds 512 bytes of executable code! The example programs include:

• Guess the number.
• Tic-Tac-Toe game.
• Text graphics.
• Mandelbrot set.
• F-Bird game.
• Invaders game.
• Pillman game.
• Toledo Atomchess.
• bootBASIC language.

http://www.lulu.com/shop/oscar-toledo-gutierrez/programming-boot-sector-games/paperback/product-24188564.html

Programming Boot Sector Games