[PLUG] Building Your Linux Firmware Security Toolkit
Mark Heimstaedt
markheim9 at gmail.com
Thu Apr 2 21:19:11 UTC 2015
Given past discussion herein re: firmware malware, thought I would alert
all to this session at upcoming LinuxFest ...
April 25th and 26th LinuxFest Northwest in Bellingham, Washington
*Building Your Linux Firmware Security Toolkit*
lee.fisher <http://linuxfestnorthwest.org/users/leefisher>
This presentation will cover the current open source tools for diagnosing
and securing system firmware of Linux systems. The main focus is on the
CHIPSEC security tool and the LUV-live and FWTS-live distributions.
Topics:
* Using Intel's CHIPSEC security tool, and how to write new modules.
* Using LUV-live (Linux UEFI Validation) distribution.
* Using the FWTS (FirmWare Test Suite) tools and FWTS-live distribution.
* Building an EFI Boot Disk and using the UEFI Shell and a subset of it's
commands useful for security research.
* Using the TianoCore UEFI Developer Kit (UDK) tools useful for forensic
use.
* Using the EFI port of CPython and how to extend it.
* Using LAVA for 'continuous integration'-style firmware and pre-OS
security testing of virtual and physical hardware.
The target audience is system administrators and advanced users looking to
build a firmware security toolkit to help secure your Intel and ARM
systems. Some Python language skills would be helpful.
*Time: *
2015-04-26 15:00-2015-04-26 16:00
Experience level
Advanced
Session Track
Privacy & Security
--
Mark Heimstaedt
More information about the PLUG
mailing list