Abstract
Secure boot forms the backbone of trusted computing by ensuring that only authenticated software is executed on the designated platform. However, implementation of secure boot can have flaws leading to critical exploits.
In this presentation, we highlight a critical vulnerability in open source First Stage Boot Loader (FSBL) of AMD-Xilinx’s flagship and award winning Zynq-7000 System on Chip (SoC) solution for embedded devices. The discovered vulnerability acts as a ‘single point of failure’ allowing complete bypass of the underlying bypass RSA authentication during secure boot.
#SecureBoot #TrustedComputing #FSBL #EmbeddedSecurity
Know more - nullcon.net/be...
---------------
Follow Nullcon on Facebook: / nullcon
X: / nullcon
LinkedIn: / posts
Website: nullcon.net/
Негізгі бет Nullcon Berlin 2024 | Breaking RSA Authentication & Bitstream Recovery From Zynq-7000 SoC-Arpan Jati
Пікірлер