What firmware exists in your computer and how the fight for your systems will be below your operating system
Page Content
Steve Battista - MITRE
Apr 18, 2012
Size: 523.1MB
Download:
MP4 Video
Watch in your Browser (Flash Required)
Abstract
Many security professionals look to software on hardrives as the source of compromise. To detect compromises, they use systems to check the hashes of all files on disk, When a machine is compromised, they wipe the hardrive, and assume that the machine in clean. The battlefield between attackers and defenders is moving to the firmware level. This presentation will explore what firmware exists in your computer and how the fight for your systems will be below your operating system and what can be done about this.
About the Speaker
Mr. Battista has over 20 years of professional experience in securing systems, creating architectures, examining research, and running programs. During this time has focused on large federal government and infrastructure systems. He currently works for MITRE as a lead cyber security engineer. He holds a M.B.A from Temple University and a M.S. in Computer Science from Villanova. He holds PMP, CISSP and NSA-IAM/IEM certifications. He is currently on the board of the ISSA-NOVA.
Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M.
STEW G52, West Lafayette Campus.
More information...
© 1999-2013 Purdue University. All rights reserved.
Use/Reuse Guidelines
CERIAS Seminar materials are intended for educational, non-commercial use only and any or all commercial use is prohibited. Any use must attribute "The CERIAS Seminar at Purdue University." Opinions expressed in the recordings are not necessarily representative of the views of CERIAS or of Purdue University.