├── 2012 ├── HITBsecconf2012ams │ └── D2T1 - Alex Bazhanyuk and Nikita Tarakanov - Automatically Searching for Vulnerabilities.pdf └── HackitoErgoSum_2012 │ └── HES2012-ntarakanov-SASV_ABazhanyuk.pdf ├── 2013 ├── BlackHat_USA_2013 │ └── Windows8SecureBoot_Bulygin-Furtak-Bazhniuk_BHUSA2013.pdf ├── EECS_Berkeley_Reports_2013 │ ├── EECS-2013-125.pdf │ └── EECS-2013-85.pdf └── ESORICS_2013 │ └── caselden13esorics.pdf ├── 2014 ├── CanSecWest_2014 │ └── AllYourBoot_csw14-intel-final.pdf ├── DEFCON22 │ └── DEFCON22-BIOSAttacks.pdf ├── Ekoparty10 │ └── eko10-BERserk_New_RSA_Signature_Forgery_Attack.pdf ├── wp-berserk-analysis-part-1.pdf └── wp-berserk-analysis-part-2.pdf ├── 2015 ├── BlackHat_DEFCON_2015 │ └── AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf ├── CanSecWest_2015 │ └── ANewClassOfVulnInSMIHandlers_csw2015.pdf ├── Latincrypt_2015 │ └── ASN1_parsing_issues_in_crypto_Latincrypt2015.pdf ├── RECon_2015 │ └── AttackingAndDefendingBIOS-RECon2015.pdf ├── SOURCE_2015 │ └── source-seattle-2015-generic_vmm_fingerprinting.pdf ├── USENIX_WOOT_2015 │ ├── woot15-paper-bazhaniuk.pdf │ └── woot15_slides_bazhaniuk.pdf └── WP_Intel_ATR_S3_ResBS_Vuln.pdf ├── 2016 ├── RECon_2016_firmware_security_training │ ├── BIOS-UEFI-Security-MiscMaterials.pdf │ ├── BIOS-UEFI-Security-MiscMaterials.pptx │ ├── BIOS-UEFI-Security.0-Intro.pdf │ ├── BIOS-UEFI-Security.0-Intro.pptx │ ├── BIOS-UEFI-Security.1-FirmwareFundamentals.pdf │ ├── BIOS-UEFI-Security.1-FirmwareFundamentals.pptx │ ├── BIOS-UEFI-Security.2-BootkitsSecureBoot.pdf │ ├── BIOS-UEFI-Security.2-BootkitsSecureBoot.pptx │ ├── BIOS-UEFI-Security.3-HandsOnPlatform.pdf │ ├── BIOS-UEFI-Security.3-HandsOnPlatform.pptx │ ├── BIOS-UEFI-Security.4-FirmwareAttackVectors.pdf │ ├── BIOS-UEFI-Security.4-FirmwareAttackVectors.pptx │ ├── BIOS-UEFI-Security.5-HandsOnEFI.pdf │ ├── BIOS-UEFI-Security.5-HandsOnEFI.pptx │ ├── BIOS-UEFI-Security.6-Mitigations.pdf │ ├── BIOS-UEFI-Security.6-Mitigations.pptx │ ├── BIOS-UEFI-Security.7-FirmwareForensics.pdf │ ├── BIOS-UEFI-Security.7-FirmwareForensics.pptx │ └── README.md └── analyze.cc_2016 │ └── Different_methods_of_BIOS_analysis.pdf ├── 2017 ├── 44CON_2017 │ └── Bulygin_Bazhaniuk_44con.pdf ├── BlackHat_USA_2017 │ └── us-17-Bulygin-Fractured-Backbone-Breaking-Modern-OS-Defenses-With-Firmware-Attacks.pdf ├── CanSecWest_2017 │ └── csw2017_ExploringYourSystemDeeper_updated.pdf ├── DEFCON25 │ └── DC25_Driving down the rabbit hole-Mickey_Jesse_Oleksander.pdf ├── Ekoparty13_2017 │ └── us-17-Bazhaniuk-Bulygin-BluePill-for-Your-Phone.pdf ├── REConBrussels_2017 │ └── REConBrussels2017_BARing_the_system.pdf ├── RECon_2017 │ └── DiggingIntoTheCoreOfBoot.pdf └── Troopers_2017 │ └── TR17_Attacking_hypervisor_through_hardwear_emulation.pdf └── README.md /2012/HITBsecconf2012ams/D2T1 - Alex Bazhanyuk and Nikita Tarakanov - Automatically Searching for Vulnerabilities.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2012/HITBsecconf2012ams/D2T1 - Alex Bazhanyuk and Nikita Tarakanov - Automatically Searching for Vulnerabilities.pdf -------------------------------------------------------------------------------- /2012/HackitoErgoSum_2012/HES2012-ntarakanov-SASV_ABazhanyuk.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2012/HackitoErgoSum_2012/HES2012-ntarakanov-SASV_ABazhanyuk.pdf -------------------------------------------------------------------------------- /2013/BlackHat_USA_2013/Windows8SecureBoot_Bulygin-Furtak-Bazhniuk_BHUSA2013.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2013/BlackHat_USA_2013/Windows8SecureBoot_Bulygin-Furtak-Bazhniuk_BHUSA2013.pdf -------------------------------------------------------------------------------- /2013/EECS_Berkeley_Reports_2013/EECS-2013-125.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2013/EECS_Berkeley_Reports_2013/EECS-2013-125.pdf -------------------------------------------------------------------------------- /2013/EECS_Berkeley_Reports_2013/EECS-2013-85.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2013/EECS_Berkeley_Reports_2013/EECS-2013-85.pdf -------------------------------------------------------------------------------- /2013/ESORICS_2013/caselden13esorics.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2013/ESORICS_2013/caselden13esorics.pdf -------------------------------------------------------------------------------- /2014/CanSecWest_2014/AllYourBoot_csw14-intel-final.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2014/CanSecWest_2014/AllYourBoot_csw14-intel-final.pdf -------------------------------------------------------------------------------- /2014/DEFCON22/DEFCON22-BIOSAttacks.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2014/DEFCON22/DEFCON22-BIOSAttacks.pdf -------------------------------------------------------------------------------- /2014/Ekoparty10/eko10-BERserk_New_RSA_Signature_Forgery_Attack.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2014/Ekoparty10/eko10-BERserk_New_RSA_Signature_Forgery_Attack.pdf -------------------------------------------------------------------------------- /2014/wp-berserk-analysis-part-1.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2014/wp-berserk-analysis-part-1.pdf -------------------------------------------------------------------------------- /2014/wp-berserk-analysis-part-2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2014/wp-berserk-analysis-part-2.pdf -------------------------------------------------------------------------------- /2015/BlackHat_DEFCON_2015/AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2015/BlackHat_DEFCON_2015/AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf -------------------------------------------------------------------------------- /2015/CanSecWest_2015/ANewClassOfVulnInSMIHandlers_csw2015.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2015/CanSecWest_2015/ANewClassOfVulnInSMIHandlers_csw2015.pdf -------------------------------------------------------------------------------- /2015/Latincrypt_2015/ASN1_parsing_issues_in_crypto_Latincrypt2015.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2015/Latincrypt_2015/ASN1_parsing_issues_in_crypto_Latincrypt2015.pdf -------------------------------------------------------------------------------- /2015/RECon_2015/AttackingAndDefendingBIOS-RECon2015.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2015/RECon_2015/AttackingAndDefendingBIOS-RECon2015.pdf -------------------------------------------------------------------------------- /2015/SOURCE_2015/source-seattle-2015-generic_vmm_fingerprinting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2015/SOURCE_2015/source-seattle-2015-generic_vmm_fingerprinting.pdf -------------------------------------------------------------------------------- /2015/USENIX_WOOT_2015/woot15-paper-bazhaniuk.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2015/USENIX_WOOT_2015/woot15-paper-bazhaniuk.pdf -------------------------------------------------------------------------------- /2015/USENIX_WOOT_2015/woot15_slides_bazhaniuk.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2015/USENIX_WOOT_2015/woot15_slides_bazhaniuk.pdf -------------------------------------------------------------------------------- /2015/WP_Intel_ATR_S3_ResBS_Vuln.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2015/WP_Intel_ATR_S3_ResBS_Vuln.pdf -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security-MiscMaterials.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security-MiscMaterials.pdf -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security-MiscMaterials.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security-MiscMaterials.pptx -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.0-Intro.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.0-Intro.pdf -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.0-Intro.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.0-Intro.pptx -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.1-FirmwareFundamentals.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.1-FirmwareFundamentals.pdf -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.1-FirmwareFundamentals.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.1-FirmwareFundamentals.pptx -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.2-BootkitsSecureBoot.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.2-BootkitsSecureBoot.pdf -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.2-BootkitsSecureBoot.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.2-BootkitsSecureBoot.pptx -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.3-HandsOnPlatform.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.3-HandsOnPlatform.pdf -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.3-HandsOnPlatform.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.3-HandsOnPlatform.pptx -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.4-FirmwareAttackVectors.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.4-FirmwareAttackVectors.pdf -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.4-FirmwareAttackVectors.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.4-FirmwareAttackVectors.pptx -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.5-HandsOnEFI.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.5-HandsOnEFI.pdf -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.5-HandsOnEFI.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.5-HandsOnEFI.pptx -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.6-Mitigations.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.6-Mitigations.pdf -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.6-Mitigations.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.6-Mitigations.pptx -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.7-FirmwareForensics.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.7-FirmwareForensics.pdf -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.7-FirmwareForensics.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/BIOS-UEFI-Security.7-FirmwareForensics.pptx -------------------------------------------------------------------------------- /2016/RECon_2016_firmware_security_training/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/RECon_2016_firmware_security_training/README.md -------------------------------------------------------------------------------- /2016/analyze.cc_2016/Different_methods_of_BIOS_analysis.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2016/analyze.cc_2016/Different_methods_of_BIOS_analysis.pdf -------------------------------------------------------------------------------- /2017/44CON_2017/Bulygin_Bazhaniuk_44con.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2017/44CON_2017/Bulygin_Bazhaniuk_44con.pdf -------------------------------------------------------------------------------- /2017/BlackHat_USA_2017/us-17-Bulygin-Fractured-Backbone-Breaking-Modern-OS-Defenses-With-Firmware-Attacks.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2017/BlackHat_USA_2017/us-17-Bulygin-Fractured-Backbone-Breaking-Modern-OS-Defenses-With-Firmware-Attacks.pdf -------------------------------------------------------------------------------- /2017/CanSecWest_2017/csw2017_ExploringYourSystemDeeper_updated.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2017/CanSecWest_2017/csw2017_ExploringYourSystemDeeper_updated.pdf -------------------------------------------------------------------------------- /2017/DEFCON25/DC25_Driving down the rabbit hole-Mickey_Jesse_Oleksander.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2017/DEFCON25/DC25_Driving down the rabbit hole-Mickey_Jesse_Oleksander.pdf -------------------------------------------------------------------------------- /2017/Ekoparty13_2017/us-17-Bazhaniuk-Bulygin-BluePill-for-Your-Phone.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2017/Ekoparty13_2017/us-17-Bazhaniuk-Bulygin-BluePill-for-Your-Phone.pdf -------------------------------------------------------------------------------- /2017/REConBrussels_2017/REConBrussels2017_BARing_the_system.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2017/REConBrussels_2017/REConBrussels2017_BARing_the_system.pdf -------------------------------------------------------------------------------- /2017/RECon_2017/DiggingIntoTheCoreOfBoot.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2017/RECon_2017/DiggingIntoTheCoreOfBoot.pdf -------------------------------------------------------------------------------- /2017/Troopers_2017/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/2017/Troopers_2017/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/abazhaniuk/Publications/HEAD/README.md --------------------------------------------------------------------------------