Vijay Sarvepalli (@vijaycert) 's Twitter Profile
Vijay Sarvepalli

@vijaycert

Keep life chaotic.

ID: 1615637965

linkhttps://www.sarvepalli.net calendar_today23-07-2013 16:23:20

421 Tweet

119 Followers

84 Following

Vijay Sarvepalli (@vijaycert) 's Twitter Profile Photo

UEFI signing and revocation challenges - hopefully forces us to improve UEFI SecureBoot. Each and every time a bootloader is introduced to a new environment, more checks than signing are likely necessary.

Vijay Sarvepalli (@vijaycert) 's Twitter Profile Photo

PKI is hard in practice, esp. firmware well here is Platform Key(PK) in a production Lenovo server mokutil --pk [key 1] Signature Algorithm: sha256WithRSAEncryption Issuer: CN=DO NOT TRUST - Test PK Validity Not Before: Mar 6 15:16:55 2013 GMT Not After : Mar 6 15:16:54 2017 GMT

Vijay Sarvepalli (@vijaycert) 's Twitter Profile Photo

Some really great work on CPU bug that affects multiple CPU families. - heard of Fast String MSR? always new surprises lingering on how CPU optimizations and internal interpretations can also carry straggling bugs. lock.cmpxchg8b.com/reptar.html

Vijay Sarvepalli (@vijaycert) 's Twitter Profile Photo

Here #UEFI SHIM related story has started. What happens when there is a bootloader vulnerability that is part of shim. eclypsium.com/blog/the-real-…

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Intel Hardware Shield deep dive: part 2 is SMM security policy reporting (ISSR, aka PPAM) and interaction with Windows' Secure Launch. tandasat.github.io/blog/2024/03/1… Another fascinating piece of technology! I have wanted to review this for a while and am glad I have spent time for it.

Intel Hardware Shield deep dive: part 2 is SMM security policy reporting (ISSR, aka PPAM) and interaction with Windows' Secure Launch.
tandasat.github.io/blog/2024/03/1…

Another fascinating piece of technology! I have wanted to review this for a while and am glad I have spent time for it.
Vijay Sarvepalli (@vijaycert) 's Twitter Profile Photo

"we are repeating the same mistakes that we did in the past, We decided at some point it is super convenient to mix code and data... we are mixing code and data that we send to these AI systems.... that are under the control of the user." Dr. Daniel Gruss youtube.com/watch?v=XxVHku…

UEFI Forum (@uefiforum) 's Twitter Profile Photo

In the upcoming #UEFIForum webinar “Coordinating #UEFI Vulnerabilities as CERT/CC,” Carnegie Mellon University will provide practical steps when coordinating UEFI vulnerabilities. Join us for the webinar on Nov. 21 at 8 a.m. PT: bit.ly/4ffgZZ1

In the upcoming #UEFIForum webinar “Coordinating #UEFI Vulnerabilities as CERT/CC,” <a href="/CarnegieMellon/">Carnegie Mellon University</a> will provide practical steps when coordinating UEFI vulnerabilities. Join us for the webinar on Nov. 21 at 8 a.m. PT: bit.ly/4ffgZZ1
Vijay Sarvepalli (@vijaycert) 's Twitter Profile Photo

Here is another #UEFI vulnerability that takes months to coordinate. UEFI blocking DBX updates are still trickling in - most Linux and Windows users, trusting SecureBoot, are currently vulnerable. Digitally signing supply-chain is another major gap in our UEFI 5 recommendations

Software Engineering Institute (@sei_cmu) 's Twitter Profile Photo

The SEI's CERT Division has released a new vulnerability note: Multiple deserialization vulnerabilities in PyTorch Lightning 2.4.0 and earlier versions. Learn more ➡️ kb.cert.org/vuls/id/252619…

The SEI's CERT Division has released a new vulnerability note: Multiple deserialization vulnerabilities in PyTorch Lightning 2.4.0 and earlier versions. Learn more ➡️
kb.cert.org/vuls/id/252619…