Source |
CSO |
Identifiant |
1102528 |
Date de publication |
2019-05-10 11:04:00 (vue: 2019-05-10 21:00:13) |
Titre |
New Intel firmware boot verification bypass enables low-level backdoors |
Texte |
Researchers have found a new way to defeat the boot verification process for some Intel-based systems, but the technique can also impact other platforms and can be used to compromise machines in a stealthy and persistent way.[ Keep up with 8 hot cyber security trends (and 4 going cold). Give your career a boost with top security certifications: Who they're for, what they cost, and which you need. | Sign up for CSO newsletters. ]
Researchers Peter Bosch and Trammell Hudson presented a time-of-check, time-of-use (TOCTOU) attack against the Boot Guard feature of Intel's reference Unified Extensible Firmware Interface (UEFI) implementation at the Hack in the Box conference in Amsterdam this week. |
Envoyé |
Oui |
Condensat |
against also amsterdam article attack backdoors based boost boot bosch box but bypass can career certifications: check click cold compromise conference cost cso cyber defeat enables extensible feature firmware found full give going guard hack have here hot hudson impact implementation intel interface keep level low machines need new newsletters other persistent peter platforms please presented process read reference researchers security sign some stealthy systems technique they time toctou top trammell trends uefi unified use used verification way week what which who your |
Tags |
Hack
|
Stories |
|
Notes |
|
Move |
|