Infecting the Boot to Own the Kernel
Alejandro Vazquez, Maria San Jose
DEF CON 33 · Day 1 · Main Stage
Bootkits and rootkits represent some of the most powerful and most feared categories of malware. They persist below the operating system, survive reinstallation, and can subvert every security control
AI review
Fully functional open-source UEFI bootkit plus Windows kernel rootkit, live demo on a physical machine with Secure Boot enabled — a reference implementation the community can build defenses against.