What firmware exists in your computer and how the fight for your systems will be below your operating system
Steve Battista - MITRE
Apr 18, 2012Size: 523.1MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractMany security professionals look to software on hardrives as the source of compromise. To detect compromises, they use systems to check the hashes of all files on disk, When a machine is compromised, they wipe the hardrive, and assume that the machine in clean. The battlefield between attackers and defenders is moving to the firmware level. This presentation will explore what firmware exists in your computer and how the fight for your systems will be below your operating system and what can be done about this.
About the SpeakerMr. Battista has over 20 years of professional experience in securing systems, creating architectures, examining research, and running programs. During this time has focused on large federal government and infrastructure systems. He currently works for MITRE as a lead cyber security engineer. He holds a M.B.A from Temple University and a M.S. in Computer Science from Villanova. He holds PMP, CISSP and NSA-IAM/IEM certifications. He is currently on the board of the ISSA-NOVA.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.