DEFCON 20: Hacking Measured Boot and UEFI

UEFI secure booting has been on the minds of many hackers and open sources advocates. Some believe that it will lock out certain operating systems in favor of vendor’s proprietary systems. (There have even been recent reports of bricking Samsung laptops just by trying to boot Linux.)

In this video from last Summer’s DEFCON 20 conference, Dan Griffin, President of JW Secure, Inc., demonstrates trusted boot in action, and releases his Measured Boot Tool which allows you to view Trusted Platform Module (TPM) boot data and identify risks such as unsigned early-boot drivers.

This entry was posted in demonstrations, security, tools, Videos and tagged , , .

Comments

  1. Lloyd Atkinson says:

    I agree with the notion that it was designed to lock out (or at least make it harder for less experienced people to run) other operating systems.

    The people behind UEFI claim it is to “make booting more secure” and “prevent boot sector infections”. Seriously, when was the last time someone had even been a victim to a bootsector infection?

Leave a Comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Notify me of followup comments via e-mail. You can also subscribe without commenting.