How Direct Memory Access Attacks Bypass Hardware Protections

Presented by

Jesse Michael and Mickey Shaktov, Principal Researchers, Eclypsium

About this talk

New research from Eclypsium shows that high-speed DMA attacks can bypass built-in hardware protections on enterprise devices. Jesse Michael and Mickey Shkatov recently demonstrated that, even in the presence of protections such as UEFI Secure Boot, Intel Boot Guard, HP Sure Start, and Microsoft Virtualization-Based Security, laptops from Dell & HP were susceptible to pre-boot DMA attacks. In this webinar, they describe their research, and discuss the ramifications for enterprise security.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (49)
Subscribers (3261)
Eclypsium is the industry’s leading enterprise firmware protection platform - providing a new layer of security to protect your IT infrastructure from firmware attacks. Eclypsium defends enterprises and government agencies from vulnerabilities and threats hidden within firmware that are invisible to most organizations today.