We describe principles and implementation details of UEFI BIOS attacks and vulnerabilities, suggesting the possible security enhancement approaches. We describe the hidden Intel Management Engine implementation details and possible consequences of its security possible discredit. Described breaches in UEFI and Intel Management Engine could possibly lead to the invention of "invulnerable" malicious applications. We highlight the base principles and actual state of Management Engine (which is a part of UEFI BIOS firmware) and its attack vectors using reverse engineering techniques
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
While the resilience of software-only code obfuscation remains unclear and ultimately depends only o...
Earlier this year our team has presented an attack against Intel ® TXT that exploited a design probl...
Unified Extensible Firmware Interface (UEFI) is a software interface between an operating system and...
International audienceI/O attacks have received increasing attention during the last decade. These a...
International audienceAttacks targeting computer systems become more and more complex and various. S...
In this paper we present the results of our research into security of the Intel ® Trusted Execution ...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change ...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
Not long ago, it was thought that only software applications and general purpose digital systems i.e...
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critic...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
The UEFI specification has more tightly coupled the bonds of the operating system and the platform f...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
While the resilience of software-only code obfuscation remains unclear and ultimately depends only o...
Earlier this year our team has presented an attack against Intel ® TXT that exploited a design probl...
Unified Extensible Firmware Interface (UEFI) is a software interface between an operating system and...
International audienceI/O attacks have received increasing attention during the last decade. These a...
International audienceAttacks targeting computer systems become more and more complex and various. S...
In this paper we present the results of our research into security of the Intel ® Trusted Execution ...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change ...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
Not long ago, it was thought that only software applications and general purpose digital systems i.e...
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critic...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
The UEFI specification has more tightly coupled the bonds of the operating system and the platform f...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
While the resilience of software-only code obfuscation remains unclear and ultimately depends only o...
Earlier this year our team has presented an attack against Intel ® TXT that exploited a design probl...