- Sleep Attack: Intel Bootguard vulnerability waking from S3 (CVE-2020-8705) https://trmm.net/sleep_attack/ 5 comments netsec
Linking pages
- Hackers can use just-fixed Intel bugs to install malicious firmware on PCs | Ars Technica https://arstechnica.com/information-technology/2020/11/intel-patches-high-severity-bugs-protecting-lost-stolen-or-confiscated-pcs/ 14 comments
- Boot Unguarded: x86 Trust Anchor Downfalls to The Leaked OEM Internal Tools and Signing Keys https://hardenedlinux.org/blog/2023-09-07-boot-unguarded-x86-trust-anchor-downfalls-to-the-leaked-oem-internal-tools-and-signing-keys/ 0 comments
Linked pages
- https://www.intel.com/content/www/us/en/support/articles/000025619/software.html 506 comments
- http://blog.ptsecurity.com/2020/03/intelx86-root-of-trust-loss-of-trust.html 395 comments
- Material for MkDocs http://squidfunk.github.io/mkdocs-material 77 comments
- The Empire Strikes Back Apple â how your Mac firmware security is completely broken | Reverse Engineering https://reverse.put.as/2015/05/29/the-empire-strikes-back-apple-how-your-mac-firmware-security-is-completely-broken/ 66 comments
- https://embedi.com/blog/bypassing-intel-boot-guard 37 comments
- Hackers can use just-fixed Intel bugs to install malicious firmware on PCs | Ars Technica https://arstechnica.com/information-technology/2020/11/intel-patches-high-severity-bugs-protecting-lost-stolen-or-confiscated-pcs/ 14 comments
- GitHub - flothrone/bootguard https://github.com/flothrone/bootguard 7 comments
- Who Watch BIOS Watchers?. Bypass specific AMI implementations of… | by Alex Matrosov | Firmware Threat Hunting | Medium https://medium.com/@matrosov/bypass-intel-boot-guard-cc05edfca3a9 5 comments
Related searches:
Search whole site: site:trmm.net
Search title: Sleep Attack: Intel Bootguard vulnerability waking from S3 - Trammell Hudson's Projects
See how to search.