Home Webinars 20 Ways Past Secure Boot

20 Ways Past Secure Boot

This discussion covers the mechanisms behind Secure Boot, its potential vulnerabilities, and various methods attackers may use to compromise it. Viewers will gain insights into the root of trust, digital signatures, and the delegation of trust between entities that underpin Secure Boot. The presentation explores real-world scenarios, such as successful Secure Boot attacks and the consequences, including code extraction, privilege escalation, and persistent exploits.

This webinar addresses challenges in implementation, common flaws, and the complexity involved, making it a must-watch for anyone involved in securing digital systems.