Artwork

محتوای ارائه شده توسط CCC media team. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط CCC media team یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

From Boot to Root: Identifying and Mitigating Security Issues in Bootloaders (glt25)

26:31
 
اشتراک گذاری
 

Manage episode 479202124 series 2475293
محتوای ارائه شده توسط CCC media team. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط CCC media team یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
With the advent of verified/secure boot, bootloaders have become critical components in the chain of trust for embedded Linux systems. This talk will explore common security issues in verified boot implementations and provide an in-depth analysis of vulnerabilities found in popular bootloaders. Attendees will learn about the implications of these vulnerabilities and practical mitigation strategies to enhance device security. Over decades, the role of bootloaders has been rather straightforward, loading an operating system kernel and starting it, optionally with some configuration or visual enhancements. However, with the rise of verified, or secure boot, bootloaders now find themselves at the beginning of the chain of trust. Being a member of the chain of trust comes with significant responsibility. Bugs or misconfigurations are no longer just unpleasant; they now undermine the entire security concept of a device. In this talk, Richard will highlight common problems he has encountered in verified boot implementations of embedded Linux systems. He will also provide a deep dive into some vulnerabilities he has discovered in popular bootloaders and discuss how to mitigate them. Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://pretalx.linuxtage.at/glt25/talk/JBLASG/
  continue reading

1879 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 479202124 series 2475293
محتوای ارائه شده توسط CCC media team. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط CCC media team یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
With the advent of verified/secure boot, bootloaders have become critical components in the chain of trust for embedded Linux systems. This talk will explore common security issues in verified boot implementations and provide an in-depth analysis of vulnerabilities found in popular bootloaders. Attendees will learn about the implications of these vulnerabilities and practical mitigation strategies to enhance device security. Over decades, the role of bootloaders has been rather straightforward, loading an operating system kernel and starting it, optionally with some configuration or visual enhancements. However, with the rise of verified, or secure boot, bootloaders now find themselves at the beginning of the chain of trust. Being a member of the chain of trust comes with significant responsibility. Bugs or misconfigurations are no longer just unpleasant; they now undermine the entire security concept of a device. In this talk, Richard will highlight common problems he has encountered in verified boot implementations of embedded Linux systems. He will also provide a deep dive into some vulnerabilities he has discovered in popular bootloaders and discuss how to mitigate them. Licensed to the public under https://creativecommons.org/licenses/by/4.0/ about this event: https://pretalx.linuxtage.at/glt25/talk/JBLASG/
  continue reading

1879 قسمت

Alle episoder

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش