Alex Tereshkin

@AlexTereshkin

Poked firmware before it was cool

Vrijeme pridruživanja: kolovoz 2015.

Tweetovi

Blokirali ste korisnika/cu @AlexTereshkin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @AlexTereshkin

  1. proslijedio/la je Tweet
    20. sij

    I'm thrilled to announce, I will be a keynote speaker for ! Stay tuned for more details ;-)

    Poništi
  2. 5. stu 2019.
    Poništi
  3. proslijedio/la je Tweet
    6. lis 2019.

    Thread: And now for the update to the timeline for the last year or so of firmware security stuff I am usually more focused on...

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    24. srp 2019.

    It took us some serious time, but I've finally got all required official approvals to continue working on UEFITool, huge props to for making that happen. My first commit since 2016, adding ME region parser and extended ucode header parser:

    Poništi
  5. proslijedio/la je Tweet
    1. srp 2019.

    My keynote slides "The Advanced Threats Evolution: REsearchers Arm Race" from released! The golden age of FW/HW implants is happening right now!! Honestly preparing these slides took more time than my usual research presentations :-)

    Poništi
  6. proslijedio/la je Tweet
    23. svi 2019.

    Intel still didn't learn the lesson: without firmware downgrade prevention the fixes in CSME firmware can't protect and in some cases actually do nothing

    Poništi
  7. proslijedio/la je Tweet
    26. tra 2019.

    I will be giving the keynote at ! As much as modern OS evolving in the direction of building more mitigations to increase the cost of exploitation and malware persistent techniques, as much advanced threat actors looking more for the next lowest level of persistent.

    Poništi
  8. proslijedio/la je Tweet
    28. ožu 2019.

    My slides "Attacking Hardware Root of Trust from UEFI Firmware" released. More details about bypass Boot Guard implementation on Lenovo Thinkpad's coming after and . Enjoy evil SMI handlers over WMI and stay tuned!

    Poništi
  9. proslijedio/la je Tweet
    29. ožu 2019.

    Intel VISA demo: extracting one's of Intel SoCs security fuses (debug root key for TPM, ME file system, Intel IPT and others):

    Poništi
  10. proslijedio/la je Tweet
    13. pro 2018.

    Happy to announce all the chapters of now available in Early Access (~600 p). 4 years of writing/rewriting. The book almost a double the size from the original proposal (rootkits/bootkits, UEFI threats and modern forensics) Thx and !!

    Poništi
  11. 28. sij 2019.

    I'll be doing System Management Mode Rootkits training at conference in Singapore (March 24th-27th), most likely for the last time. Everyone interested in firmware security is welcome!

    Poništi
  12. proslijedio/la je Tweet
    27. pro 2018.

    We're having an "Introduction to Qubes OS" session this Saturday at the 35th Chaos Communication Congress in Leipzig: We'll start with the absolute basics and build from there; no prior knowledge needed! All are welcome!

    Poništi
  13. proslijedio/la je Tweet
    27. pro 2018.

    Tune in to the livestream twenty minutes from now (22:50) for "Modchips of the State", my thoughts on the technical feasibility of the Supermicro hardware implant story.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    28. stu 2018.
    Poništi
  15. proslijedio/la je Tweet

    Thank you Marek for all the work on Qubes OS you have done over the last 7 years and may the Force be with you!

    Poništi
  16. proslijedio/la je Tweet
    2. lis 2018.

    Our new paper "Intel ME Manufacturing Mode: obscured dangers" about SPI write-protection bypass in Apple MacBook. [ru] [en]

    Poništi
  17. proslijedio/la je Tweet
    1. lis 2018.

    New blog if you want to know how to protect from implants like the one used by

    Poništi
  18. proslijedio/la je Tweet
    27. kol 2018.

    Ready to uncover Intel ME background? Use our PoC to activate JTAG and dump ME ROM

    Poništi
  19. proslijedio/la je Tweet
    14. kol 2018.

    Some hardcore Hyper-V hypervisor engineering work to mitigate nasty CPU side channel bugs. Coming up with performant solutions to these types of problems is not easy!

    Poništi
  20. proslijedio/la je Tweet
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·