The Apple of Your EFI An Updated Study of EFI Security

Subscribers:
6,120
Published on ● Video Link: https://www.youtube.com/watch?v=gO6d-azD3_4



Category:
Vlog
Duration: 1:01:02
4 views
0


Black Hat - Europe - 2017 Hacking conference

Duo Labs conducted an extensive data analysis on the state of Apple's EFI security from two main perspectives. The first was analysing all EFI updates released by Apple since OS X 10.10.0 through macOS 10.12.6 to fully characterise the security support provided across different Mac models and OS versions. This also provided a baseline for the "expected state" Mac systems should be in - this defined as the state the user would expect their Mac's software and firmware to be in after running the available updates. The second was an analysis across over 73,000 real-world Mac systems to compare the actual state of their EFI against the expected state.

Our findings cover a range of anomalies and security issues with the security support provided by Apple for their EFI firmware. More worryingly, our analysis shows significant deviations in the real-world state of EFI firmware in Macs compared to the expected state, which causes us to suspect a more systemic issue causing the failure of new EFI firmware that is supposed to be automatically installed alongside an OS update.

In addition to the data analysis discussed above, our research also aims to shine a light on the mechanisms used to update Apple's EFI itself - discussing how Apple's EFI updater tools operate and the controls they have in place. These insights come from the binary analysis of the tools themselves, we are confident that this has not been discussed in this great of detail anywhere else - until now.

Alongside our findings in the form of a technical paper, we are also releasing the tools and APIs to enable admins and end users to have far greater visibility into the state of the EFI firmware on their Apple systems and to understand the security implications that it may contain.


Presenters:
Rich Smith - Director of R&D, Duo Labs, Duo Security
Rich Smith is the Director of R&D for Duo Labs and supports the advanced security research & development agenda for Duo Security, he is also a co-author of the new book 'Agile Application Security' published by O'Reilly. Prior to joining Duo, Rich was Director of Security at Etsy, co-founder of Icelandic red team startup, Syndis, and has held various roles on security teams at Immunity, Kyrus, Morgan Stanley, and HP Labs. Rich has worked professionally in the security space since the late 90's covering a range of activities including building security organizations, security consulting, penetration testing, red teaming, offensive research, and developing exploits and attack tooling. He has worked in both the public and private sectors in the U.S., Europe, and Scandinavia, and currently spends most of his time bouncing between Detroit, Reykjavik and NYC.
Pepijn Bruienne - R&D Engineer, Duo Security
Pepijn Bruienne is a Research and Development Engineer at Duo Security in Ann Arbor, Michigan. He breaks Macs to help his employer's customers be more secure. With more than a decade and a half of experience in a variety of Mac Admins areas, his skills include Systems Administration, Operations Management, Mac/Linux/Windows Server and Desktop integration, software deployment, configuration management and process automation.
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-21Windows Event Logs Zero to Hero Nate Guagenti Adam Swan
2021-12-21Math and Cryptography Sam Gross
2021-12-21Abusing Google Dorking and Robotstxt Dave Comstock fixed by Frank Trezza
2021-12-21Abusing Google Dorking and Robotstxt Dave Comstock
2021-12-21APT What the heck is an APT Bill Barnes
2021-12-21Securely Deleting Data from SSDs Stephen Larson
2021-12-21Strange times we live in Alexander Muentz
2021-12-21Technological Changes that Affect Forensic Investigations Diane Barrett BloomCon - 2017
2021-12-20Breaking Bad Stealing Patient Data Through Medical Devices
2021-12-20Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming
2021-12-20The Apple of Your EFI An Updated Study of EFI Security
2021-12-20Locknote Conclusions and Key Takeaways From Black Hat Europe 2017
2021-12-20Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing
2021-12-20Exfiltrating Reconnaissance Data from Air Gapped ICS SCADA Networks
2021-12-20Key Reinstallation Attacks Breaking the WPA2 Protocol Black Hat - Europe - 2017
2021-12-20Self Verifying Authentication A Framework For Safer Integrations of Single Sign On Services
2021-12-20Jailbreaking Apple Watch Black Hat - Europe - 2017
2021-12-20BlueBorne A New Class of Airborne Attacks that can Remotely Compromise Any Linux IoT Device
2021-12-20Automating Incident Response
2021-12-20Detach Me Not DoS Attacks Against 4G Cellular Users Worldwide from your Desk
2021-12-20Mobile Espionage in the Wild Pegasus and Nation State Level Attacks



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering