web.archive.org/web/20220608001558/http:/www.mitre.org/publications/project-stories/going-deep-into-the-bios-with-mitre-firmware-security-research

Preview meta tags from the web.archive.org website.

Linked Hostnames

1

Search Engine Appearance

Google

https://web.archive.org/web/20220608001558/http:/www.mitre.org/publications/project-stories/going-deep-into-the-bios-with-mitre-firmware-security-research

Going Deep into the BIOS with MITRE Firmware Security Research

At the 2009 BlackHat USA security conference, a sophisticated attack demonstration by Polish researchers showed vulnerabilities in the latest defense of a computer's BIOS. Previously, computer professionals believed that digital signatures prevented BIOS modifications by unauthorized users. However, researchers at the conference demonstrated that an attacker could manipulate



Bing

Going Deep into the BIOS with MITRE Firmware Security Research

https://web.archive.org/web/20220608001558/http:/www.mitre.org/publications/project-stories/going-deep-into-the-bios-with-mitre-firmware-security-research

At the 2009 BlackHat USA security conference, a sophisticated attack demonstration by Polish researchers showed vulnerabilities in the latest defense of a computer's BIOS. Previously, computer professionals believed that digital signatures prevented BIOS modifications by unauthorized users. However, researchers at the conference demonstrated that an attacker could manipulate



DuckDuckGo

https://web.archive.org/web/20220608001558/http:/www.mitre.org/publications/project-stories/going-deep-into-the-bios-with-mitre-firmware-security-research

Going Deep into the BIOS with MITRE Firmware Security Research

At the 2009 BlackHat USA security conference, a sophisticated attack demonstration by Polish researchers showed vulnerabilities in the latest defense of a computer's BIOS. Previously, computer professionals believed that digital signatures prevented BIOS modifications by unauthorized users. However, researchers at the conference demonstrated that an attacker could manipulate

  • General Meta Tags

    25
    • title
      Going Deep into the BIOS with MITRE Firmware Security Research | The MITRE Corporation
    • Content-Type
      text/html; charset=utf-8
    • description
      At the 2009 BlackHat USA security conference, a sophisticated attack demonstration by Polish researchers showed vulnerabilities in the latest defense of a computer's BIOS. Previously, computer professionals believed that digital signatures prevented BIOS modifications by unauthorized users. However, researchers at the conference demonstrated that an attacker could manipulate
    • generator
      Drupal 7 (https://www.drupal.org)
    • article:published_time
      2014-03-14T11:30:58-04:00
  • Open Graph Meta Tags

    6
    • og:site_name
      The MITRE Corporation
    • og:type
      article
    • og:title
      Going Deep into the BIOS with MITRE Firmware Security Research
    • og:url
      https://web.archive.org/web/20220528052840/https://www.mitre.org/publications/project-stories/going-deep-into-the-bios-with-mitre-firmware-security-research
    • og:description
      At the 2009 BlackHat USA security conference, a sophisticated attack demonstration by Polish researchers showed vulnerabilities in the latest defense of a computer's BIOS. Previously, computer professionals believed that digital signatures prevented BIOS modifications by unauthorized users. However, researchers at the conference demonstrated that an attacker could manipulate the way the BIOS displayed images in order to defeat the system's security.
  • Twitter Meta Tags

    4
    • twitter:card
      summary
    • twitter:title
      Going Deep into the BIOS with MITRE Firmware Security Research
    • twitter:url
      https://web.archive.org/web/20220528052840im_/https://www.mitre.org/publications/project-stories/going-deep-into-the-bios-with-mitre-firmware-security-research
    • twitter:description
      At the 2009 BlackHat USA security conference, a sophisticated attack demonstration by Polish researchers showed vulnerabilities in the latest defense of a computer's BIOS. Previously, computer
  • Link Tags

    17
    • apple-touch-icon-precomposed
      /web/20220528052840im_/https://www.mitre.org/sites/all/themes/mitre/release/images/touch/apple-touch-icon-120x120-precomposed.png
    • apple-touch-icon-precomposed
      /web/20220528052840im_/https://www.mitre.org/sites/all/themes/mitre/release/images/touch/apple-touch-icon-60x60-precomposed.png
    • apple-touch-icon-precomposed
      /web/20220528052840im_/https://www.mitre.org/sites/all/themes/mitre/release/images/touch/apple-touch-icon-152x152-precomposed.png
    • apple-touch-icon-precomposed
      /web/20220528052840im_/https://www.mitre.org/sites/all/themes/mitre/release/images/touch/apple-touch-icon-76x76-precomposed.png
    • apple-touch-icon-precomposed
      /web/20220528052840im_/https://www.mitre.org/sites/all/themes/mitre/release/images/touch/apple-touch-icon-144x144-precomposed.png

Links

379