SlideShare a Scribd company logo
1 of 60
Presenter’s Name
Presenter's Position
BETRAYING THE BIOS:
WHERE THE GUARDIANS OF THE BIOS ARE FAILING
Alex Matrosov
@matrosov
Who We Are: Alex Matrosov
Have a lot of fun with UEFI Security and RE
Former Security Researcher @Intel
Reverse Engineering since 1997
Book co-author nostarch.com/rootkits
@matrosov
Agenda Intro
 Attacks on BIOS Updates
 Unsigned Updates
 BIOS protection bits
 SmiFlash and SecSmiFlash
 Intel Boot Guard
 AMI implementation details
 Discover ACM secrets
 Vulns
 Boot Guard Bypass!
 Intel BIOS Guard
 AMI implementation details
All rootkits want to get into Ring 0
Operating System
Before OS loads
Loader (ring 3) Rootkit (ring 0)
MBR/ VBR
(bootcode)
SMM (ring -2)
Loader
(bootcode)
Rootkit (ring 0)
Loader (ring -2) Rootkit (ring 0)
Code
Signing
Policy
Rootkits Bootkits Secure Boot
BIOS
Implants
H
A
R
D
W
A
R
E
More mitigations, more rootkits complexity
Growths of configuration based vulnerabilities
https://www.blackhat.com/docs/us-17/thursday/us-17-Branco-Firmware-Is-The-New-Black-Analyzing-Past-Three-Years-Of-
BIOS-UEFI-Security-Vulnerabilities.pdf
Google Titan Chip
https://cloudplatform.googleblog.com/2017/08/Titan-in-depth-security-in-plaintext.html
BIOS Update Issues
No more legacy! UEFI is everywhere!!
UEFI Firmware
Image
CPU Microcode
Management
Engine
AMT
BMC
SMC
Network
Graphics
Sensors
Embedded
Controller (EC)
PMU
ACM
Boot Guard BIOS Guard TXT
How many different firmware's inside BIOS update?
All the vulnerabilities mention in this research
found inside AMI-based UEFI firmware’s
All Guardians of the BIOS on one slide
FLOCKDN
ACM/ Microcode
BIOS_CNTL
UEFI
Firmware
Image
BIOS Lock Bit
(BLE)
BIOS_WE
SMM_BWP
SPI Write
Protection
(PRx)
BIOS Guard
Boot Guard
Signed Image
Vendor Name BLE SMM_BWP PRx Authenticated
Update
ASUS
+ + - -
MSI
- - - -
Gigabyte
+ + - -
Dell
+ + -+ +
Lenovo
+ + RP +
HP
+ + RP/WP +
Intel
+ + - +
Apple
- - WP +
How different vendors care about security?
blackhat.com/docs/asia-17/materials/asia-17-Matrosov-The-UEFI-Firmware-Rootkits-Myths-And-Reality.pdf
Why so vulnerable?
 BIOS LOCK (BLE) not enabled
(CLVA-2016-12-001/CVE-2017-3197)
 Attacker is able to modify BIOSWE bit
 Attacker can arbitrary write to SPI flash from OS
 FW update process don’t verify signature
 Attacker is able to abuse BIOS updater with signed driver
 SmiFlash Handler multiple vulns
(CLVA-2016-12-002/CVE-2017-3198)
 Attacker can elevate privileges to SMM (ring -2)
How BIOS Update Guardians Fail?
SMM
OS
Update Driver
Memory(DRAM)
Update App
SmiFlash
SecSmiFlash
SPI Flash
Update Image
Ring 3
Ring -2
Ring 0
1
2
3
5
SMIFlash Handler Issues: Gigabyte, Lenovo, MSI
 SmiFlash HANDLERS (SMiFlash.efi)
[BC327DBD-B982-4f55-9F79-056AD7E987C5]
 ENABLE 0x20
 READ 0x21
 ERASE 0x22
 WRITE 0x23
 DISABLE 0x24
 GET_INFO 0x25
 No checks for the input pointers
SmmIsBufferOutsideSmmValid()
SecSMIFlash Handler Issues: ASUS
 SecSmiFlash HANDLERS (SecSMiFlash.efi) 
[3370A4BD-8C23-4565-A2A2-065FEEDE6080]
 LOAD_IMAGE 0x1d
 GET_POLICY 0x1e
 SET_POLICY 0x1f
 No checks for the input pointers
SmmIsBufferOutsideSmmValid()
Responsible Disclosure Fun
 Discovery Date: 2017-04-20
 Intel PSIRT Notified: 2017-05-22
 All the Vendors Notified: 2017-05-26
 Disclosure Notification Date: 2017-05-30
 Lenovo Released a Patch: 2017-07-11
 ASUS Released a Patch: 2017-06-23
 MITRE Assign 6 CVE’s: 2017-07-13
 Gigabyte Released a Patch: 2017-07-25
 Public Disclosure Date: 2017-07-27
https://github.com/CylanceVulnResearch/disclosures
ASUS Responsible Disclosure Fun
Intel Boot Guard
Different shades of Secure Boot
 Secure Boot -> since 2012
 Root of Trust = Firmware -> BIOS
 Attack Surface = Firmware
 Measured Boot (Boot Guard) -> since 2013
 Root of Trust = Hardware -> Trusted Platform Module (TPM)
 Attack Surface = Firmware
 Verified Boot (Boot Guard) -> since 2013
 Root of Trust = Hardware -> Field Programming Fuse (FPF)->Locked
 Attack Surface = Firmware + Hardware
Why Boot Guard has been created?
 Secure Boot starts from DXE phase and impacted with any SMM
issues/implants
 No verification on early boot for SEC/PEI boot phases
 Measured Boot starts before PEI phase but also impacted with
any SMM issues/implants
 The Root of Trust must be locked by hardware (Verified Boot)
 The first step of verification should rely on microcode
authentication
Intel Boot Guard Technology
http://vzimmer.blogspot.com/2013/09/where-do-i-sign-up.html
Boot Guard: Boot Flow
Locked in BIOS
Locked in Hardware
CPU
Microcode
CPU
Reset
Boot Guard
ACM
Reset
Vector
IBB
(SEC + PEI)
Secure Boot
(DXE + BDS)
OS Loader
Intel Boot Guard operating modes
 Not Enabled
 Measured Boot (root of trust = TPM)
 Verified Boot (root of trust = FPF)
 Measured + Verified Boot (root of trust = FPF + TPM)
Demystifying Intel Boot Guard
https://firmware.intel.com/sites/default/files/STTS003%20-%20SF15_STTS003_100f.pdf
Platform Controller Hub (PCH)
Management Engine (ME)
Field Programing Fuse (FPF)
hash of root OEM pub key (SHA-256)
RW UEFI Firmware Image
Key Manifest (KM) Initial Boot Block Manifest
(IBBM)
key manifest security version
number (SVN)
hash of IBB pub key
(SHA-256)
OEM root pub key
(RSA-2048)
RSA signature on KM SVN
+
hash of IBBM pub key
IBBM security version number
(SVN)
hash of IBB (SHA-256)
IBBM pub key (RSA-2048)
RSA signature on IBBM SVN
+
hash of IBB
Boot Guard: Chain of Trust
Demystifying Intel Boot Guard
http://en.community.dell.com/techcenter/extras/m/white_papers/20444061
Vendor Name ME Access EC Access CPU Debugging
(DCI)
Boot Guard Forced
Boot Guard
ACM
Boot
Guard FPF
BIOS Guard
ASUS VivoMini Disabled Disabled Enabled Disabled Disabled Disabled Disabled
MSI Cubi2 Disabled Disabled Enabled Disabled Disabled Disabled Disabled
Gigabyte Brix Read/Write
Enabled
Read/Write
Enabled
Enabled Measured
Verified
Enabled
(FPF not set)
Not Set Disabled
Dell Disabled Disabled Enabled Measured
Verified
Enabled Enabled Enabled
Lenovo
ThinkCentre
Disabled Disabled Enabled Disabled Disabled Disabled Disabled
HP Elitedesk Disabled Disabled Enabled Disabled Disabled Disabled Disabled
Intel NUC Disabled Disabled Enabled Disabled Disabled Disabled Disabled
Apple Read
Enabled
Disabled Disabled Not
Supported
Not
Supported
Not
Supported
Not
Supported
Guard’s Configuration of Tested Hardware
Safeguarding Rootkits: Intel BootGuard
by Alex Ermolov
2016.zeronights.ru/wp-content/uploads/2017/03/Intel-BootGuard.pdf
Grugq
Platform Controller Hub (PCH)
Management Engine (ME)
Field Programing Fuse (FPF)
hash of root OEM pub key (SHA-256)
RW UEFI Firmware Image
Key Manifest (KM) Initial Boot Block Manifest
(IBBM)
key manifest security version
number (SVN)
hash of IBB pub key
(SHA-256)
OEM root pub key
(RSA-2048)
RSA signature on KM SVN
+
hash of IBBM pub key
IBBM security version number
(SVN)
hash of IBB (SHA-256)
IBBM pub key (RSA-2048)
RSA signature on IBBM SVN
+
hash of IBB
Boot Guard: Chain of Trust
Boot Guard: Key Manifest (KM)
Platform Controller Hub (PCH)
Management Engine (ME)
Field Programing Fuse (FPF)
hash of root OEM pub key (SHA-256)
RW UEFI Firmware Image
Key Manifest (KM) Initial Boot Block Manifest
(IBBM)
key manifest security version
number (SVN)
hash of IBB pub key
(SHA-256)
OEM root pub key
(RSA-2048)
RSA signature on KM SVN
+
hash of IBBM pub key
IBBM security version number
(SVN)
hash of IBB (SHA-256)
IBBM pub key (RSA-2048)
RSA signature on IBBM SVN
+
hash of IBB
Boot Guard: Chain of Trust
Boot Guard: Boot Policy Manifest (BPM)
Boot Guard:
Initial Boot
Block (IBB)
Boot Guard: Authenticated Code Module (ACM)
EntryPoint
RSA Pub Key
ACM Header
RSA Exp
RSA Signature
 ACM is x86 (32-bit) code developed by Intel
 ACM executes in AC-RAM (Cache-as-RAM or NEM)
 ACM has CPU and Chipset specifics
 ACM verifies Key Manifest (KEYM) + IBB (IBBM)
Boot Guard: Authenticated Code Module (ACM)
Boot Guard: Authenticated Code Module (ACM)
Boot Guard ACM BinDiff: Haswell vs Skylake
Boot Guard ACM BinDiff: Broadwell vs Skylake
Boot Guard BIOS Components (AMI)
 PEI
 BootGuardPei [B41956E1-7CA2-42db-9562-168389F0F066]
 SMM
 VerifyFwBootGuard [EE89F590-A816-4ac5-B3A9-1BC759B12439]
 DXE
 BootGuardDxe [1DB43EC9-DF5F-4cf5-AAF0-0E85DB4E149A]
BootGuardPei Validation Flow
Boot Guard:
PEI FV_HASH
 FV_HASH_KEY [CBC91F44-A4BC-4A5B-8696-703451D0B053]
VerifyFwBootGuard SMM Validation Flow
(Intel ME communications over HECI)
 Find and Verify ACM
 Verify ACM SVN
 Find and Verify Key Manifest (KM)
 Verify KM SVN
 Find and Verify Boot Policy Manifest (BPM)
 Verify BPM SVN
 If something wrong return EFI_SECURITY_VIOLATION
BootGuardDxe Validation Flow
BootGuardDxe Validation Flow
• https://embedi.com/blog/bypassing-intel-boot-guard
• Intel NUC Boot Guard Bypass CVE-2017-5722 kudos to Alex Ermolov
• https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084
Target Platform
 Gigabyte (GB-BSi7HA-6500)
 Intel 6th generation Core i7 CPU (Skylake) with vPro
 Intel Boot Guard – ENABLED
 Intel BIOS Guard – NOT ENABLED
 Vulnerabilities
 Host Write/Read Access to ME (CVE-2017-11314)
 Intel Boot Guard Configuration not Locked (CVE-2017-11313)
Five steps to bypass Boot Guard
1) Modify UEFI firmware update image with rootkit/implant
or
Disable Intel Boot Guard
2) Initial Boot Block (IBB)
 Recalculate signature on 2048-bit RSA key pair for IBB
 Modify IBB manifest inside UEFI firmware update file
 Recalculate signature for IBB manifest with different 2048-bit RSA key pair
3) Modify Root Key manifest
 Recalculate SHA256 hash of the public key from Root Key Manifest
4) Modify ME region with new key (CVE-2017-11314)
 Modify Boot Guard configuration with active verified boot policy
5) Lock Boot Guard configuration with by FPF (CVE-2017-11313)
Platform Controller Hub (PCH)
Management Engine (ME)
Field Programing Fuse (FPF)
hash of root OEM pub key (SHA-256)
RW UEFI Firmware Image
Key Manifest (KM) Initial Boot Block Manifest
(IBBM)
key manifest security version
number (SVN)
hash of IBB pub key
(SHA-256)
OEM root pub key
(RSA-2048)
RSA signature on KM SVN
+
hash of IBBM pub key
IBBM security version number
(SVN)
hash of IBB (SHA-256)
IBBM pub key (RSA-2048)
RSA signature on IBBM SVN
+
hash of IBB
Boot Guard: Chain of Trust
“Intel provides a 6th and 7th generation Core Platforms
Secure Configuration Specification, which covers how to
securely configure the platform. Additionally, Intel makes
available a utility that our ecosystem partners can use to
test and identify potential configuration issues.”
Intel Statement
“For FPF issue, we discuss with internal the BIOS don’t
need any update but we will add ME Lock tool to our
production process soon, the new production ship will
include ME Lock.”
Gigabyte Statement
UEFITool for Intel Boot Guard visual validation
https://github.com/LongSoft/UEFITool/releases/tag/A43
https://medium.com/@matrosov/bypass-intel-boot-guard-
cc05edfca3a9
All the stuff will be released on public
save the link:
https://github.com/REhints/BlackHat_2017
Thank you for your attention!
Alex Matrosov
@matrosov

More Related Content

What's hot

iostat await svctm の 見かた、考え方
iostat await svctm の 見かた、考え方iostat await svctm の 見かた、考え方
iostat await svctm の 見かた、考え方歩 柴田
 
ceph optimization on ssd ilsoo byun-short
ceph optimization on ssd ilsoo byun-shortceph optimization on ssd ilsoo byun-short
ceph optimization on ssd ilsoo byun-shortNAVER D2
 
EBPF and Linux Networking
EBPF and Linux NetworkingEBPF and Linux Networking
EBPF and Linux NetworkingPLUMgrid
 
[2018] 오픈스택 5년 운영의 경험
[2018] 오픈스택 5년 운영의 경험[2018] 오픈스택 5년 운영의 경험
[2018] 오픈스택 5년 운영의 경험NHN FORWARD
 
The Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast StorageThe Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast StorageKernel TLV
 
LISA2019 Linux Systems Performance
LISA2019 Linux Systems PerformanceLISA2019 Linux Systems Performance
LISA2019 Linux Systems PerformanceBrendan Gregg
 
Oracle RAC features on Exadata
Oracle RAC features on ExadataOracle RAC features on Exadata
Oracle RAC features on ExadataAnil Nair
 
VLANs in the Linux Kernel
VLANs in the Linux KernelVLANs in the Linux Kernel
VLANs in the Linux KernelKernel TLV
 
Container Network Interface: Network Plugins for Kubernetes and beyond
Container Network Interface: Network Plugins for Kubernetes and beyondContainer Network Interface: Network Plugins for Kubernetes and beyond
Container Network Interface: Network Plugins for Kubernetes and beyondKubeAcademy
 
오픈스택: 구석구석 파헤쳐보기
오픈스택: 구석구석 파헤쳐보기오픈스택: 구석구석 파헤쳐보기
오픈스택: 구석구석 파헤쳐보기Jaehwa Park
 
“見てわかる” ファイバーチャネルSAN基礎講座(第2弾)~FC SAN設計における勘所とは?~
“見てわかる” ファイバーチャネルSAN基礎講座(第2弾)~FC SAN設計における勘所とは?~“見てわかる” ファイバーチャネルSAN基礎講座(第2弾)~FC SAN設計における勘所とは?~
“見てわかる” ファイバーチャネルSAN基礎講座(第2弾)~FC SAN設計における勘所とは?~Brocade
 
Open vSwitch 패킷 처리 구조
Open vSwitch 패킷 처리 구조Open vSwitch 패킷 처리 구조
Open vSwitch 패킷 처리 구조Seung-Hoon Baek
 
A deep dive about VIP,HAIP, and SCAN
A deep dive about VIP,HAIP, and SCAN A deep dive about VIP,HAIP, and SCAN
A deep dive about VIP,HAIP, and SCAN Riyaj Shamsudeen
 
Arm device tree and linux device drivers
Arm device tree and linux device driversArm device tree and linux device drivers
Arm device tree and linux device driversHoucheng Lin
 
QEMU Disk IO Which performs Better: Native or threads?
QEMU Disk IO Which performs Better: Native or threads?QEMU Disk IO Which performs Better: Native or threads?
QEMU Disk IO Which performs Better: Native or threads?Pradeep Kumar
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5Vepsun Technologies
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Kuniyasu Suzaki
 
Enable DPDK and SR-IOV for containerized virtual network functions with zun
Enable DPDK and SR-IOV for containerized virtual network functions with zunEnable DPDK and SR-IOV for containerized virtual network functions with zun
Enable DPDK and SR-IOV for containerized virtual network functions with zunheut2008
 

What's hot (20)

iostat await svctm の 見かた、考え方
iostat await svctm の 見かた、考え方iostat await svctm の 見かた、考え方
iostat await svctm の 見かた、考え方
 
ceph optimization on ssd ilsoo byun-short
ceph optimization on ssd ilsoo byun-shortceph optimization on ssd ilsoo byun-short
ceph optimization on ssd ilsoo byun-short
 
EBPF and Linux Networking
EBPF and Linux NetworkingEBPF and Linux Networking
EBPF and Linux Networking
 
[2018] 오픈스택 5년 운영의 경험
[2018] 오픈스택 5년 운영의 경험[2018] 오픈스택 5년 운영의 경험
[2018] 오픈스택 5년 운영의 경험
 
The Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast StorageThe Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast Storage
 
LISA2019 Linux Systems Performance
LISA2019 Linux Systems PerformanceLISA2019 Linux Systems Performance
LISA2019 Linux Systems Performance
 
Oracle RAC features on Exadata
Oracle RAC features on ExadataOracle RAC features on Exadata
Oracle RAC features on Exadata
 
VLANs in the Linux Kernel
VLANs in the Linux KernelVLANs in the Linux Kernel
VLANs in the Linux Kernel
 
Ceph issue 해결 사례
Ceph issue 해결 사례Ceph issue 해결 사례
Ceph issue 해결 사례
 
Split lock
Split lockSplit lock
Split lock
 
Container Network Interface: Network Plugins for Kubernetes and beyond
Container Network Interface: Network Plugins for Kubernetes and beyondContainer Network Interface: Network Plugins for Kubernetes and beyond
Container Network Interface: Network Plugins for Kubernetes and beyond
 
오픈스택: 구석구석 파헤쳐보기
오픈스택: 구석구석 파헤쳐보기오픈스택: 구석구석 파헤쳐보기
오픈스택: 구석구석 파헤쳐보기
 
“見てわかる” ファイバーチャネルSAN基礎講座(第2弾)~FC SAN設計における勘所とは?~
“見てわかる” ファイバーチャネルSAN基礎講座(第2弾)~FC SAN設計における勘所とは?~“見てわかる” ファイバーチャネルSAN基礎講座(第2弾)~FC SAN設計における勘所とは?~
“見てわかる” ファイバーチャネルSAN基礎講座(第2弾)~FC SAN設計における勘所とは?~
 
Open vSwitch 패킷 처리 구조
Open vSwitch 패킷 처리 구조Open vSwitch 패킷 처리 구조
Open vSwitch 패킷 처리 구조
 
A deep dive about VIP,HAIP, and SCAN
A deep dive about VIP,HAIP, and SCAN A deep dive about VIP,HAIP, and SCAN
A deep dive about VIP,HAIP, and SCAN
 
Arm device tree and linux device drivers
Arm device tree and linux device driversArm device tree and linux device drivers
Arm device tree and linux device drivers
 
QEMU Disk IO Which performs Better: Native or threads?
QEMU Disk IO Which performs Better: Native or threads?QEMU Disk IO Which performs Better: Native or threads?
QEMU Disk IO Which performs Better: Native or threads?
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
 
Enable DPDK and SR-IOV for containerized virtual network functions with zun
Enable DPDK and SR-IOV for containerized virtual network functions with zunEnable DPDK and SR-IOV for containerized virtual network functions with zun
Enable DPDK and SR-IOV for containerized virtual network functions with zun
 

Similar to Bypassing the Guardians of the BIOS

Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & futureAlex Matrosov
 
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCsw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCanSecWest
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinESET
 
Bootkits step by-step-slides-final-v1-release
Bootkits step by-step-slides-final-v1-releaseBootkits step by-step-slides-final-v1-release
Bootkits step by-step-slides-final-v1-releaseEric Koeppen
 
Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...
Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...
Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...Cristofaro Mune
 
BIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks UncoveredBIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks UncoveredAlex Matrosov
 
Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605benavrhm
 
US-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdf
US-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdfUS-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdf
US-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdfAlexYoung899213
 
Persistent BIOS Infection
Persistent BIOS InfectionPersistent BIOS Infection
Persistent BIOS Infectionguest042636
 
Persistent Bios Infection
Persistent Bios InfectionPersistent Bios Infection
Persistent Bios Infectionguest042636
 
PEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot SecurelyPEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot SecurelyRiscure
 
PEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot SecurelyPEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot SecurelyNiek Timmers
 
[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the...
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the...[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the...
[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the...Moabi.com
 
Upgrade Ubuntu 18.04 Security with Secureboot
Upgrade Ubuntu 18.04 Security with SecurebootUpgrade Ubuntu 18.04 Security with Secureboot
Upgrade Ubuntu 18.04 Security with SecurebootJonathan MICHEL-VILLAZ
 
UEFI Firmware Rootkits: Myths and Reality
UEFI Firmware Rootkits: Myths and RealityUEFI Firmware Rootkits: Myths and Reality
UEFI Firmware Rootkits: Myths and RealitySally Feller
 
Secret of Intel Management Engine by Igor Skochinsky
Secret of Intel Management Engine  by Igor SkochinskySecret of Intel Management Engine  by Igor Skochinsky
Secret of Intel Management Engine by Igor SkochinskyCODE BLUE
 

Similar to Bypassing the Guardians of the BIOS (20)

Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & future
 
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCsw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus Bulletin
 
Bootkits step by-step-slides-final-v1-release
Bootkits step by-step-slides-final-v1-releaseBootkits step by-step-slides-final-v1-release
Bootkits step by-step-slides-final-v1-release
 
Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...
Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...
Blue Hat IL 2019 - Hardening Secure Boot on Embedded Devices for Hostile Envi...
 
BIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks UncoveredBIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks Uncovered
 
Slimline Open Firmware
Slimline Open FirmwareSlimline Open Firmware
Slimline Open Firmware
 
BeagleBone Black Booting Process
BeagleBone Black Booting ProcessBeagleBone Black Booting Process
BeagleBone Black Booting Process
 
Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605
 
BeagleBone Black Bootloaders
BeagleBone Black BootloadersBeagleBone Black Bootloaders
BeagleBone Black Bootloaders
 
US-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdf
US-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdfUS-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdf
US-22-Matrosov-Breaking-Firmware-Trust-From-Pre-EFI.pdf
 
BeagleBone Black Bootloaders
BeagleBone Black BootloadersBeagleBone Black Bootloaders
BeagleBone Black Bootloaders
 
Persistent BIOS Infection
Persistent BIOS InfectionPersistent BIOS Infection
Persistent BIOS Infection
 
Persistent Bios Infection
Persistent Bios InfectionPersistent Bios Infection
Persistent Bios Infection
 
PEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot SecurelyPEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot Securely
 
PEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot SecurelyPEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot Securely
 
[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the...
[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the...[DEFCON 16] Bypassing pre-boot authentication passwords  by instrumenting the...
[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the...
 
Upgrade Ubuntu 18.04 Security with Secureboot
Upgrade Ubuntu 18.04 Security with SecurebootUpgrade Ubuntu 18.04 Security with Secureboot
Upgrade Ubuntu 18.04 Security with Secureboot
 
UEFI Firmware Rootkits: Myths and Reality
UEFI Firmware Rootkits: Myths and RealityUEFI Firmware Rootkits: Myths and Reality
UEFI Firmware Rootkits: Myths and Reality
 
Secret of Intel Management Engine by Igor Skochinsky
Secret of Intel Management Engine  by Igor SkochinskySecret of Intel Management Engine  by Igor Skochinsky
Secret of Intel Management Engine by Igor Skochinsky
 

More from BlueHat Security Conference

BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Security Conference
 
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Security Conference
 
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Security Conference
 
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Security Conference
 
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Security Conference
 
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Security Conference
 
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Security Conference
 
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Security Conference
 
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Security Conference
 
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Security Conference
 
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Security Conference
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat Security Conference
 
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat Security Conference
 
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat Security Conference
 
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat Security Conference
 
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat Security Conference
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat Security Conference
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat Security Conference
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat Security Conference
 

More from BlueHat Security Conference (20)

BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
 
BlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || KeynoteBlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || Keynote
 
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
 
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
 
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
 
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
 
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
 
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
 
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
 
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
 
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
 
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiled
 
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
 
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
 
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
 
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and well
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without device
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Bypassing the Guardians of the BIOS

  • 1. Presenter’s Name Presenter's Position BETRAYING THE BIOS: WHERE THE GUARDIANS OF THE BIOS ARE FAILING Alex Matrosov @matrosov
  • 2. Who We Are: Alex Matrosov Have a lot of fun with UEFI Security and RE Former Security Researcher @Intel Reverse Engineering since 1997 Book co-author nostarch.com/rootkits @matrosov
  • 3. Agenda Intro  Attacks on BIOS Updates  Unsigned Updates  BIOS protection bits  SmiFlash and SecSmiFlash  Intel Boot Guard  AMI implementation details  Discover ACM secrets  Vulns  Boot Guard Bypass!  Intel BIOS Guard  AMI implementation details
  • 4. All rootkits want to get into Ring 0 Operating System Before OS loads Loader (ring 3) Rootkit (ring 0) MBR/ VBR (bootcode) SMM (ring -2) Loader (bootcode) Rootkit (ring 0) Loader (ring -2) Rootkit (ring 0)
  • 5. Code Signing Policy Rootkits Bootkits Secure Boot BIOS Implants H A R D W A R E More mitigations, more rootkits complexity
  • 6. Growths of configuration based vulnerabilities https://www.blackhat.com/docs/us-17/thursday/us-17-Branco-Firmware-Is-The-New-Black-Analyzing-Past-Three-Years-Of- BIOS-UEFI-Security-Vulnerabilities.pdf
  • 9. No more legacy! UEFI is everywhere!!
  • 10. UEFI Firmware Image CPU Microcode Management Engine AMT BMC SMC Network Graphics Sensors Embedded Controller (EC) PMU ACM Boot Guard BIOS Guard TXT How many different firmware's inside BIOS update?
  • 11. All the vulnerabilities mention in this research found inside AMI-based UEFI firmware’s
  • 12. All Guardians of the BIOS on one slide FLOCKDN ACM/ Microcode BIOS_CNTL UEFI Firmware Image BIOS Lock Bit (BLE) BIOS_WE SMM_BWP SPI Write Protection (PRx) BIOS Guard Boot Guard Signed Image
  • 13. Vendor Name BLE SMM_BWP PRx Authenticated Update ASUS + + - - MSI - - - - Gigabyte + + - - Dell + + -+ + Lenovo + + RP + HP + + RP/WP + Intel + + - + Apple - - WP + How different vendors care about security?
  • 14.
  • 16. Why so vulnerable?  BIOS LOCK (BLE) not enabled (CLVA-2016-12-001/CVE-2017-3197)  Attacker is able to modify BIOSWE bit  Attacker can arbitrary write to SPI flash from OS  FW update process don’t verify signature  Attacker is able to abuse BIOS updater with signed driver  SmiFlash Handler multiple vulns (CLVA-2016-12-002/CVE-2017-3198)  Attacker can elevate privileges to SMM (ring -2)
  • 17. How BIOS Update Guardians Fail? SMM OS Update Driver Memory(DRAM) Update App SmiFlash SecSmiFlash SPI Flash Update Image Ring 3 Ring -2 Ring 0 1 2 3 5
  • 18. SMIFlash Handler Issues: Gigabyte, Lenovo, MSI  SmiFlash HANDLERS (SMiFlash.efi) [BC327DBD-B982-4f55-9F79-056AD7E987C5]  ENABLE 0x20  READ 0x21  ERASE 0x22  WRITE 0x23  DISABLE 0x24  GET_INFO 0x25  No checks for the input pointers SmmIsBufferOutsideSmmValid()
  • 19. SecSMIFlash Handler Issues: ASUS  SecSmiFlash HANDLERS (SecSMiFlash.efi)  [3370A4BD-8C23-4565-A2A2-065FEEDE6080]  LOAD_IMAGE 0x1d  GET_POLICY 0x1e  SET_POLICY 0x1f  No checks for the input pointers SmmIsBufferOutsideSmmValid()
  • 20. Responsible Disclosure Fun  Discovery Date: 2017-04-20  Intel PSIRT Notified: 2017-05-22  All the Vendors Notified: 2017-05-26  Disclosure Notification Date: 2017-05-30  Lenovo Released a Patch: 2017-07-11  ASUS Released a Patch: 2017-06-23  MITRE Assign 6 CVE’s: 2017-07-13  Gigabyte Released a Patch: 2017-07-25  Public Disclosure Date: 2017-07-27 https://github.com/CylanceVulnResearch/disclosures
  • 23. Different shades of Secure Boot  Secure Boot -> since 2012  Root of Trust = Firmware -> BIOS  Attack Surface = Firmware  Measured Boot (Boot Guard) -> since 2013  Root of Trust = Hardware -> Trusted Platform Module (TPM)  Attack Surface = Firmware  Verified Boot (Boot Guard) -> since 2013  Root of Trust = Hardware -> Field Programming Fuse (FPF)->Locked  Attack Surface = Firmware + Hardware
  • 24. Why Boot Guard has been created?  Secure Boot starts from DXE phase and impacted with any SMM issues/implants  No verification on early boot for SEC/PEI boot phases  Measured Boot starts before PEI phase but also impacted with any SMM issues/implants  The Root of Trust must be locked by hardware (Verified Boot)  The first step of verification should rely on microcode authentication
  • 25. Intel Boot Guard Technology http://vzimmer.blogspot.com/2013/09/where-do-i-sign-up.html
  • 26. Boot Guard: Boot Flow Locked in BIOS Locked in Hardware CPU Microcode CPU Reset Boot Guard ACM Reset Vector IBB (SEC + PEI) Secure Boot (DXE + BDS) OS Loader
  • 27. Intel Boot Guard operating modes  Not Enabled  Measured Boot (root of trust = TPM)  Verified Boot (root of trust = FPF)  Measured + Verified Boot (root of trust = FPF + TPM)
  • 28. Demystifying Intel Boot Guard https://firmware.intel.com/sites/default/files/STTS003%20-%20SF15_STTS003_100f.pdf
  • 29. Platform Controller Hub (PCH) Management Engine (ME) Field Programing Fuse (FPF) hash of root OEM pub key (SHA-256) RW UEFI Firmware Image Key Manifest (KM) Initial Boot Block Manifest (IBBM) key manifest security version number (SVN) hash of IBB pub key (SHA-256) OEM root pub key (RSA-2048) RSA signature on KM SVN + hash of IBBM pub key IBBM security version number (SVN) hash of IBB (SHA-256) IBBM pub key (RSA-2048) RSA signature on IBBM SVN + hash of IBB Boot Guard: Chain of Trust
  • 30. Demystifying Intel Boot Guard http://en.community.dell.com/techcenter/extras/m/white_papers/20444061
  • 31. Vendor Name ME Access EC Access CPU Debugging (DCI) Boot Guard Forced Boot Guard ACM Boot Guard FPF BIOS Guard ASUS VivoMini Disabled Disabled Enabled Disabled Disabled Disabled Disabled MSI Cubi2 Disabled Disabled Enabled Disabled Disabled Disabled Disabled Gigabyte Brix Read/Write Enabled Read/Write Enabled Enabled Measured Verified Enabled (FPF not set) Not Set Disabled Dell Disabled Disabled Enabled Measured Verified Enabled Enabled Enabled Lenovo ThinkCentre Disabled Disabled Enabled Disabled Disabled Disabled Disabled HP Elitedesk Disabled Disabled Enabled Disabled Disabled Disabled Disabled Intel NUC Disabled Disabled Enabled Disabled Disabled Disabled Disabled Apple Read Enabled Disabled Disabled Not Supported Not Supported Not Supported Not Supported Guard’s Configuration of Tested Hardware
  • 32.
  • 33. Safeguarding Rootkits: Intel BootGuard by Alex Ermolov 2016.zeronights.ru/wp-content/uploads/2017/03/Intel-BootGuard.pdf
  • 34. Grugq
  • 35. Platform Controller Hub (PCH) Management Engine (ME) Field Programing Fuse (FPF) hash of root OEM pub key (SHA-256) RW UEFI Firmware Image Key Manifest (KM) Initial Boot Block Manifest (IBBM) key manifest security version number (SVN) hash of IBB pub key (SHA-256) OEM root pub key (RSA-2048) RSA signature on KM SVN + hash of IBBM pub key IBBM security version number (SVN) hash of IBB (SHA-256) IBBM pub key (RSA-2048) RSA signature on IBBM SVN + hash of IBB Boot Guard: Chain of Trust
  • 36. Boot Guard: Key Manifest (KM)
  • 37. Platform Controller Hub (PCH) Management Engine (ME) Field Programing Fuse (FPF) hash of root OEM pub key (SHA-256) RW UEFI Firmware Image Key Manifest (KM) Initial Boot Block Manifest (IBBM) key manifest security version number (SVN) hash of IBB pub key (SHA-256) OEM root pub key (RSA-2048) RSA signature on KM SVN + hash of IBBM pub key IBBM security version number (SVN) hash of IBB (SHA-256) IBBM pub key (RSA-2048) RSA signature on IBBM SVN + hash of IBB Boot Guard: Chain of Trust
  • 38. Boot Guard: Boot Policy Manifest (BPM)
  • 39.
  • 41. Boot Guard: Authenticated Code Module (ACM) EntryPoint RSA Pub Key ACM Header RSA Exp RSA Signature
  • 42.  ACM is x86 (32-bit) code developed by Intel  ACM executes in AC-RAM (Cache-as-RAM or NEM)  ACM has CPU and Chipset specifics  ACM verifies Key Manifest (KEYM) + IBB (IBBM) Boot Guard: Authenticated Code Module (ACM)
  • 43. Boot Guard: Authenticated Code Module (ACM)
  • 44. Boot Guard ACM BinDiff: Haswell vs Skylake
  • 45. Boot Guard ACM BinDiff: Broadwell vs Skylake
  • 46. Boot Guard BIOS Components (AMI)  PEI  BootGuardPei [B41956E1-7CA2-42db-9562-168389F0F066]  SMM  VerifyFwBootGuard [EE89F590-A816-4ac5-B3A9-1BC759B12439]  DXE  BootGuardDxe [1DB43EC9-DF5F-4cf5-AAF0-0E85DB4E149A]
  • 48. Boot Guard: PEI FV_HASH  FV_HASH_KEY [CBC91F44-A4BC-4A5B-8696-703451D0B053]
  • 49. VerifyFwBootGuard SMM Validation Flow (Intel ME communications over HECI)  Find and Verify ACM  Verify ACM SVN  Find and Verify Key Manifest (KM)  Verify KM SVN  Find and Verify Boot Policy Manifest (BPM)  Verify BPM SVN  If something wrong return EFI_SECURITY_VIOLATION
  • 51. BootGuardDxe Validation Flow • https://embedi.com/blog/bypassing-intel-boot-guard • Intel NUC Boot Guard Bypass CVE-2017-5722 kudos to Alex Ermolov • https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084
  • 52. Target Platform  Gigabyte (GB-BSi7HA-6500)  Intel 6th generation Core i7 CPU (Skylake) with vPro  Intel Boot Guard – ENABLED  Intel BIOS Guard – NOT ENABLED  Vulnerabilities  Host Write/Read Access to ME (CVE-2017-11314)  Intel Boot Guard Configuration not Locked (CVE-2017-11313)
  • 53.
  • 54. Five steps to bypass Boot Guard 1) Modify UEFI firmware update image with rootkit/implant or Disable Intel Boot Guard 2) Initial Boot Block (IBB)  Recalculate signature on 2048-bit RSA key pair for IBB  Modify IBB manifest inside UEFI firmware update file  Recalculate signature for IBB manifest with different 2048-bit RSA key pair 3) Modify Root Key manifest  Recalculate SHA256 hash of the public key from Root Key Manifest 4) Modify ME region with new key (CVE-2017-11314)  Modify Boot Guard configuration with active verified boot policy 5) Lock Boot Guard configuration with by FPF (CVE-2017-11313)
  • 55. Platform Controller Hub (PCH) Management Engine (ME) Field Programing Fuse (FPF) hash of root OEM pub key (SHA-256) RW UEFI Firmware Image Key Manifest (KM) Initial Boot Block Manifest (IBBM) key manifest security version number (SVN) hash of IBB pub key (SHA-256) OEM root pub key (RSA-2048) RSA signature on KM SVN + hash of IBBM pub key IBBM security version number (SVN) hash of IBB (SHA-256) IBBM pub key (RSA-2048) RSA signature on IBBM SVN + hash of IBB Boot Guard: Chain of Trust
  • 56. “Intel provides a 6th and 7th generation Core Platforms Secure Configuration Specification, which covers how to securely configure the platform. Additionally, Intel makes available a utility that our ecosystem partners can use to test and identify potential configuration issues.” Intel Statement
  • 57. “For FPF issue, we discuss with internal the BIOS don’t need any update but we will add ME Lock tool to our production process soon, the new production ship will include ME Lock.” Gigabyte Statement
  • 58. UEFITool for Intel Boot Guard visual validation https://github.com/LongSoft/UEFITool/releases/tag/A43 https://medium.com/@matrosov/bypass-intel-boot-guard- cc05edfca3a9
  • 59. All the stuff will be released on public save the link: https://github.com/REhints/BlackHat_2017
  • 60. Thank you for your attention! Alex Matrosov @matrosov