LinuxCon Europe UEFI Mini-Summit presentations available

Earlier this month, the UEFI Forum recently had a “Mini-Summit” at LinuxCon Europe. The presentations are now available online (so far just the slides, unclear if A/V will show up on Youtube later):

UEFI Mini-Summit at LinuxCon Europe: October 7, 2015

* UEFI Forum Update and Open Source Community Benefits – Mark Doran (Intel)
* What Linux Developers Need to Know About Recent UEFI Spec Advances – Jeff Bobzin (Insyde Software)
* LUV Shack: An Automated Linux Kernel and UEFI Firmware Testing Infrastructure – Matt Fleming (Intel)
* Goodbye PXE, Hello HTTP Boot – Dong Wei (HP)
* UEFI Development in an Open Source Ecosystem – Michael Krau (Intel)

More information (about halfway down the page, past the Youtube section):

http://www.uefi.org/learning_center/presentationsandvideos

 

LegbaCore adds BIOS/SMM training to OpenSecurityTraining.Info!

They’ve added a 2-day training course on BIOS/SMM, “Advanced x86: Introduction to BIOS & SMM”! The BIOS researchers at MITRE — and half of them now at LebaCore — are one of the main pioneers of BIOS research, and this is one of ther main training sessions. Wow!

“Around 2011, the trustworthy system measurement research project that Xeno Kovah was running at MITRE decided to start digging deeper than the Windows kernel and rootkit detection, to try and detect malicious software at the BIOS level. Xeno & Corey Kallenberg continued to work on Kernel, while team member John Butterworth was tasked with starting to learn about BIOS in parallel. John’s work led to the “BIOS Chronomancy” work (published at both BlackHat and ACM CCS), porting the team’s existing Timing-Based Attestation system from the kernel level down to the BIOS. Xeno then asked John to start making an open source training class to capture his knowledge, the same way that Xeno & Corey had captured their past knowledge on the project and uploaded it to OST. John created a 2 day Intro BIOS class and got it public released from MITRE. The intention originally was that it would cover all basics of BIOS which would be applicable to both legacy BIOS, CoreBoot, or UEFI-based systems. And then it was expected there would be a follow on class digging deeper into the specifics of UEFI. Unfortunately time prohibited the creation of that 2nd 2 days of classes focusing on UEFI, so you can see that some minimal UEFI content was eventually shoehorned into this class, though frequently there isn’t enough time to get to it within 2 days. It is our hope that this Introductory BIOS & SMM class will help demystify how x86 systems work at the low levels, so that people can better understand the BIOS/SMM/SecureBoot vulnerabilities described in the team’s work while at MITRE, and later after Xeno & Corey founded LegbaCore. With this knowledge in hand, hopefully students can fully appreciate and explain to others why it is so critical that BIOS patch management be performed by organizations, to eliminate the vulnerabilities that lurk at this level.

http://opensecuritytraining.info/IntroBIOS.html

Satoshi’s Meow

Tanda Satoshi has created meow, an on-the-fly PatchGuard disabler for Windows 8.1 and RT which does not depends on magic values specific to build versions.

https://github.com/tandasat/meow

http://standa-note.blogspot.com.mt/2015/10/some-tips-to-analyze-patchguard.html

MY_Ouzo: DIY BadUSB

Recently My_Ouzo posted a detailed tutorial on WonderHowTo’s Null-Byte, on how to make your own BadUSB. Excerpt from introduction:

Recently a guy asked how to make your own “Bad USB” and I promised to make a how-to on this topic soon. In addition it would be nice to have something related on our wonderhowto world. So here it is! Most common USB flash drives are exploitable due to the “Bad USB vulnerability”. This allows us hackers to reprogram the microcontroller of them to act as a “Human Interface Device” (HID) / keyboard and perform custom keystrokes on our target machine. This scenario is often called “HID Payload Attack”, since you have to hand over your script to the Bad USB for the execution ( more on that later ). Even though almost every USB flash drive is exploitable, only a way to reprogram “Phison” microcontrollers has been released yet. In this tutorial we are going to determine the microcontroller of your usb flash drive, compile the source code published in github for the tools we need and move over to building a custom firmware with an embedded HID payload and turning our harmless usb flash drive into a malicious keyboard designed to help us accomplishing the compromise of our victim machine.

http://null-byte.wonderhowto.com/how-to/make-your-own-bad-usb-0165419/

FCC banning firmware modifications to opens source routers

The US Goverment’s FCC has been in the news for banning modifications to routers.

http://www.extremetech.com/computing/216361-vint-cerf-hundreds-of-researchers-call-on-fcc-to-mandate-open-source-router-firmware

http://motherboard.vice.com/en_ca/read/heres-why-cybersecurity-experts-want-open-source-routers

On a somewhat related note, here’s some security fixes to your wifi routers:

http://fieldguide.gizmodo.com/5-easy-router-tweaks-for-faster-more-secure-wifi-1734892839

 

Open Source Hardware-based AArch64 board from Olimex

We work on A64-OLinuXino the first Open Source Hardware 64-bit development board

http://kicad-pcb.org/

slides from BsidesPDX

I gave a talk at Security B-Sides Portland (Bsides PDX) today, “UEFI for Blue Teams”. Similar to the previous talk at SASAG, with a slightly-improved section on hardware lifecycle, and a few new tools listed, and a few other minor improvements.

Click to access bsidespdx-20151017.pdf

 

PS: A few of the Intel ATR people were also at BsidesPDX, and gave their DEFCON/Blackhat talk on attacking hypervisors. I *THINK* the talk was improved since the Las Vegas presentation in Summer, waiting to see if/when they upload their slides…

Android Security: Q3 Quarterly Update

Adrian Ludwig of Google posted a message to the android-security-discuss mailing list with a quarterly summary of security events. I’m not going to bother excerpting this!, I’m just going to post the entire message body:

TL;DR I’m going to start sending out a quarterly summary of things the major events going on in Android Security. Wow, did I pick a doozey of a quarter to start doing this.

Below, I’ve compiled my top 10 android security events and activities from the Q3, 2015.  The last 3 months have been amazing — any one of these might have been the most important item for Android Security during most quarters. But all of this really did happen in just the last three months.

1. Monthly updates – Announced Nexus support policy with monthly security updates for Nexus <http://officialandroid.blogspot.com/2015/08/an-update-to-nexus-devices.html&gt;. Pushed Samsung <http://www.androidcentral.com/samsung-plans-offer-new-security-updates-every-month-its-android-devices&gt; and LG <http://www.engadget.com/2015/08/07/lg-stagefright-monthly-security-updates/&gt; to make similar announcement (albeit still not realized).  Shipped three updates <https://developers.google.com/android/nexus/images&gt; to Nexus, GPE, Android One and published the corresponding security bulletins <https://groups.google.com/forum/#!forum/android-security-updates&gt;.We also expanded to Kirkland team and began to grow the team to handle our increasing incident response needs <http://go/android-vulns-dashboard&gt;.

2. Unprecedented partner engagement in security – Executive meetings on security with all major US carriers and top 5 OEMs. Worked with APE / TAM / BD to build program for Ecosystem-wide Monthly Security updates <http://go/manic-monday-pitch&gt;, rolled out our security program to all carriers, OEMs, and began to track rollouts <https://dashboards.corp.google.com/#/google::_45984543_fda2_458b_9a8a_3fe0c1130981> of security patches to devices. Here are highlights from a recent program review <https://docs.google.com/presentation/d/1c6xYbGkcIlHD-RPsv00U4vTMrzl4_CuOd-eJrU6Lf4M/edit#slide=id.g702e6832b_0_0&gt;.

3. Stagefright. Stagefright Code Yellow <http://go/stagefright-cy-track&gt;. Media Server Bugs and Hackathon <https://docs.google.com/document/d/1icuQabxBlBBfjjP967YMLliIdSSm798BO20xdYA8q9Y/edit#heading=h.enzv5yxtjeu3&gt;. Also, thanks to aarya@ of Chrome Security for driving that continued expansion of fuzzing efforts <https://docs.google.com/a/google.com/presentation/d/1docwgWwqZL0wEO5R0U5oRyMdnUhg9a3HMhmb-e5vyTM/edit?usp=drive_web&gt;.

4. Android M Security Enhancements <https://docs.google.com/presentation/d/1JfRZ5P-HmuaKJvN3SgZmXWhfoC3sirr8OVtDXPRBQZk/edit#slide=id.gaf51a6178_1_132>- I can’t believe this is #4. We shipped Verified Boot. Monthly Patch String. SeLinux IOCTL filtering. UsesClearTextTraffic. SELinux User separation. The broader Android team also shipped a major overhaul of permissions, fingerprint API, adoption of SD cards, protection for USB connections, and more.

5. Results from Android Security Regards Program <https://www.google.com/about/appsecurity/android-rewards/&gt; – Android Security Rewards launched on June 16 <https://googleonlinesecurity.blogspot.com/2015/06/announcing-security-rewards-for-android.html&gt; and by October 1, we’ve paid out over $100,000 for over 60 issues.

6. Massive Increase in Public Outreach — aludwig @ Blackhat (slides <https://docs.google.com/presentation/d/1U35ilLs3ca8AHNYXKZgl14VjS5Q-RSx3GNVQqCGQWkQ/edit&gt;, press), jeffv@ about ioctl filter <https://docs.google.com/a/google.com/presentation/d/1_meUW-MtHdCQC2YuWnrtJ7W6WXh7CTxfHz_N0TksRY4/edit?usp=drive_web&gt; at Linux Security Summit, paullawrence@ and mhalcrow@ about encryption <https://docs.google.com/a/google.com/presentation/d/1xD2Vs5hHkY8GZB4Y72QAxsPf5sraAAQmse_3IAS2UA4/edit?usp=drive_web&gt; at Linux Security Summit, nnk@ Android Security Symposium  in Vienna(slides <https://docs.google.com/a/google.com/presentation/d/1-BWUaMldBoTzd0Vx9BnjWFP69E3xF1Hk-52s2dFcioo/edit?usp=drive_web&gt;), sporst@ on Russian Malware cleanup at Virus Bulletin (slides <https://docs.google.com/presentation/d/1CrqdAm7WKAXsMja1VHVXEVGbg1vUzvoyhC5qCrqiqsY/edit&gt;, video, press <http://qz.com/514720/google-just-revealed-its-android-security-team-detected-and-defeated-a-steep-rise-in-mobile-banking-fraud-in-russia/&gt;), cbrubaker@ on NoGotofail at University of Utah (slides <https://docs.google.com/a/google.com/presentation/d/12uJxPosU_dI-X4XUQZO2BwPXWl406ny-pGWN3xFC3JI/edit?usp=sharing&gt;), smel@ spoke at Johns Hopkins (slides<https://docs.google.com/presentation/d/1dJWxs7GNUTSABYu08Yt-2eQXDaWBnTFA3DYIDGM1WDk/edit#slide=id.gca06805cf_17_22&gt;)

7. Operational Focus on Malware in Play – Monthly reviews of top PHA installs (July <https://docs.google.com/a/google.com/document/d/1vwTMvOwL4I08GrB9dyLC7ex9fg2ydeqLEg3UBh3XuT4/edit?usp=sharing&gt;, August <https://docs.google.com/document/d/197_ELrS8zhZhGxglF2aSaQq2P_0YBdDhkrlgDG5m_x4/edit&gt;, September <https://docs.google.com/document/d/1lcKEIc3JySPryR2YhlNmNdgquitfQWF9qO-aIaHUCRc/edit?ts=5612e47f&gt;) have helped drive our goal of less than 1 million installs being a PHA. (currently, the number is ~500 per million <http://go/phastats&gt;)

8. Scale up of SafetyNet Attestation (including launch of Android Pay). See recent Program Review <https://docs.google.com/presentation/d/1SHeAt7bQX_OAoe99lwfn5IP9SSKyed7WJOWM-_B9v18/edit&gt; for more details.

9. Greenhat <http://go/greenhat&gt; – 2 day, google-wide summit with the best of Android Security.  All the content  and recordings have been stored here <https://drive.google.com/a/google.com/folderview?id=0B47yL4yVz8b3flhxSkRiemUyQ1dHRDFZblloYm9hZ3doWmJOQzFDTHAwa1RFekdRVExEVXM&usp=sharing&gt;.

10. Last, but not least: Stinknet <http://go/stinknet&gt;. Publicly known as Ghost Push <http://venturebeat.com/2015/09/18/cheetah-mobile-ghost-push-android-virus-infects-600k-users-a-day-with-unwanted-apps/&gt;, (mostly) outside of Google Play we’re currently battling the largest coordinated rooting malware attack we’ve seen against Android. (We’re slowly winnning <http://go/stink&gt;, but this will likely be a highlight again next quarter.)

Anyhow, those are just a few of the big things we’ve been up to recently.

http://groups.google.com/group/android-security-discuss.

SyScan360

https://www.syscan360.org/en/schedule/

SyScan is happening soon. There are multiple hardware/firmware-level talks, including one on VxWorks. And, since I’ve a bit of a UEFI focus, there is this one:

Is There An EFI Monster Inside Your Apple?

Pedro Vilaça
A few months ago I publicly disclosed an Apple EFI firmware zero day. It was a very powerful bug allowing direct access to the EFI firmware from the operating system. EFI rootkits are some of the most powerful and most interesting rootkits. Because they work at a very low level they can play a lot of tricks to hide themselves from forensics and persist for a long time. EFI monsters are a bit like jaguars, stealthy and rarely seen by humans. This doesn’t mean they do not exist. EFI monsters are most certainly part of spy agencies rootkits catalog. Very few tools exist to chase them. This talk is about introducing you to the EFI world so you can also start to chase these monsters. EFI world might look scary but it’s a bit easier than you think and a lot of fun. Thunderstrike 2 (to be presented at BlackHat) is a fine example of the power of EFI rootkits and the problems they present.

http://www.businesswire.com/news/home/20151015006011/en/SentinelOne-Apple-Security-Expert-Present-SyScan360

Nikolaj on UEFI Security, part 7!

Nikolaj has written a 7th part to his 6-part series on UEFI security!

It covers AMD security processors, Intel STM, Intel SGX, TPM 2.0, and other current technologies.

There is mention at the end of an upcoming article on taming Secure Boot, generating your own keys, looking forward to that!

http://habrahabr.ru/post/268423/

https://translate.google.com/translate?sl=auto&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http%3A%2F%2Fhabrahabr.ru%2Fpost%2F268423%2F&edit-text=

Absolute included in new Microsoft Surface devices

Excerpt from press release:

Absolute to Support New Microsoft Surface Pro 4 and Surface Book

Absolute(R) Software Corporation today announced support for the upcoming Microsoft(R) Surface Pro 4 and Surface Book devices. Persistence(R) technology by Absolute will be embedded into the firmware of these devices at the factory. Once activated, Absolute Data & Device Security (formerly Absolute Computrace(R)) will deliver a reliable two-way connection with all endpoints, regardless of user or location, enabling IT to maintain control of these devices and the data they contain.

Full press release:
https://www.absolute.com/en/about/pressroom/press-releases/2015/absolute-to-support-new-microsoft-surface-pro-4-and-surface-book

ebiso project

There’s a new UEFI-aware ISO-building tool out, called ebiso:

UEFI bootable ISO image creator

Primary intention of ebiso was to create simple bootable UEFI ISO image for ReaR https://github.com/rear/rear on SLES11.

* supports 8.3 file name and partialy (filenames up to 200 bytes in filename length) RRIP (Rock Ridge Interchange Protocol)
* no additional dependencies
* released under GPL
* currently under heavy testing 😉
* more info will come (maybe)
* tested with rear on SLES11 SP3 and Centos 6.7

https://github.com/gozora/ebiso

https://github.com/rear/rear
http://relax-and-recover.org/

UefiGopRotate project

Aaron Pop has created a new Tianocore module:

A EDK2 Package that supplies a UEFI driver that will bind on top of Graphics Output Devices and rotate any Blt operations by 0, 90, 180 or 270 degrees.

The license appears to be custom, but BSD-like. Perhaps someone can convince Aaron to relicense to BSD and submit to Tianocore? 🙂 Presumably more vendors will need this as they ship UEFI-based tablets/smartphones and want to let user use the device the way they want.

https://github.com/apop2/UefiGopRotate

 

puppet-razor-custom project

Stevenyu1982 has started the Puppet-razor-custom project on Github.

Based on puppet razor, adding new features to support our environments. Features:
* Adding IPXE UEFI support
* Routing the IPXE UEFI and Legacy based on current BIOS setting
* Change the default BIOS boot order from Pxe and Change the UEFI to Legacy boot to support Oel6.5 installation
* ASU command intergation for changing the BIOS settings
* MegaCLI command intergraion for raid creation.

https://github.com/Stevenyu1982/puppet-razor-custom

AndCanGo project starting

Console Inc, an Android-based OS vendor, has started a new Github project for UEFI firmware for Android called AndCanGO:

AndCanGO: A project to unify the various UEFI & IA-capable fastboot and bootloaders, with its goal to deliver a custom, update-friendly Android recovery and GUI installer.

It is currently just created, an as-yet empty project. Watch for it to change in the upcoming days, along with some of their other related projects (which are not empty).

https://github.com/iConsole/AndCanGO

http://console.com.co/

OEMs/IHVs: please read

Some advice from Teddy Reed for improving your pre-sales technical information (and other metadata, such as this Windows-centric blog post started on):

Next time you see some computer, ask if you can tell what kind of firmware it has — UEFI, coreboot, U-Boot, Libreboot, etc — and if it uses the Secure/Verified/Trusted/Measured flavor of it. Look in the pre-sales technical specs the vendor offers. Try to find more details than BIOS or UEFI, like if the OEM permits you to disable Secure Boot so you can install your own OS, etc.

I wish I could point to ONE hardware review source, like Toms Hardware or Consumer Reports, that shows this kind of information. I wish I could point to ONE OEM or IHV that currently does a good job in this regard.

In addition to Microsoft’s Designed-for-Windows-N logo, IMO, OSHWA should have an Open Source Hardware logos, to help entice some vendors and consumers. Perhaps those logos are the places to include the information about the firmware, as well? I guess the FSF’s RSF program is their Free Hardware program?

Unicorn Engine released

https://twitter.com/revskills/status/654722178298986496

Unicorn is a lightweight, multi-platform, multi-architecture CPU emulator framework based on QEMU. Unicorn offers some unparalleled features:

* Multi-architecture: ARM, AMM64 (ARMv8), M68K, MIPS, SPARC, and X86 (16, 32, 64-bit)
* Clean/simple/lightweight/intuitive architecture-neutral API
* Implemented in pure C language, with bindings for Python, Java, and Go
* Native support for Windows & *nix (with Mac OSX, Linux, *BSD & Solaris confirmed)
* High performance via Just-In-Time compilation
* Support for fine-grained instrumentation at various levels
* Thread-safety by design

Unicorn was announced at BlackHat this Summer, and the source for this open source project just got released. Looking forward to using this to debug firmware …but even though it is based on QEMU, I don’t see how to Unicorn to work with OVMF. If someone knows how, please post a Comment with info!

https://github.com/unicorn-engine/unicorn
http://www.unicorn-engine.org/
https://www.blackhat.com/us-15/briefings.html#unicorn-next-generation-cpu-emulator-framework

Click to access us-15-Nguyen-Unicorn-Next-Generation-CPU-Emulator-Framework.pdf