Categories

DEFCON 20: Hacking Measured Boot and UEFI

Posted on Wednesday, February 6th, 2013 in demonstrations, security, tools, Videos by the machinegeek

UEFI secure booting has been on the minds of many hackers and open sources advocates. Some believe that it will lock out certain operating systems in favor of vendor’s proprietary systems. (There have even been recent reports of bricking Samsung laptops just by trying to boot Linux.)

In this video from last Summer’s DEFCON 20 conference, Dan Griffin, President of JW Secure, Inc., demonstrates trusted boot in action, and releases his Measured Boot Tool which allows you to view Trusted Platform Module (TPM) boot data and identify risks such as unsigned early-boot drivers.

This entry was posted on Wednesday, February 6th, 2013 at 8:00 pm and is filed under demonstrations, security, tools, Videos. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

One Response to “DEFCON 20: Hacking Measured Boot and UEFI”

  1. Lloyd Atkinson says:

    I agree with the notion that it was designed to lock out (or at least make it harder for less experienced people to run) other operating systems.

    The people behind UEFI claim it is to “make booting more secure” and “prevent boot sector infections”. Seriously, when was the last time someone had even been a victim to a bootsector infection?

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • coppice: If all you have found so far is fake iphones, the next place you should visit is SEG in Hua Qiang Bei. Get out of...
  • Edward Cooper: Great article and good find on the markets! Any chance you can provide the locations of these places? I'm in Shenzhen at the moment and...
  • Dan: I'm up for one
  • TrickyNekro: Always in for another bunch! :-D
  • mol-1: Maybe this time !