<--- Back to Details
First PageDocument Content
Cyberwarfare / Rootkit / Privilege escalation / Unified Extensible Firmware Interface / Vulnerability / Computer security / Arbitrary code execution / Exploit / Mitre Corporation / BIOS / Windows 8 / Mitre
Date: 2014-08-06 10:41:42
Cyberwarfare
Rootkit
Privilege escalation
Unified Extensible Firmware Interface
Vulnerability
Computer security
Arbitrary code execution
Exploit
Mitre Corporation
BIOS
Windows 8
Mitre

Extreme Privilege Escalation on Windows 8/UEFI Systems

Add to Reading List

Source URL: www.mitre.org

Download Document from Source Website

File Size: 3,80 MB

Share Document on Facebook

Similar Documents

Computing / Network protocols / Local area networks / Virtual LAN / Network booting / Unified Extensible Firmware Interface / Cloud infrastructure / IEEE 802.1ad / Cloud computing / Trivial File Transfer Protocol / Dynamic Host Configuration Protocol / IEEE 802.1Q

Cluster Deployment and Dynamic Partitionning with Kadeploy and KaVLAN Emmanuel Jeanvoine, Nicolas Niclausse, Lucas Nussbaum and David Margery KaVLAN – network isolation

DocID: 1r9XZ - View Document

Computing / Network booting / Software / System software / Network protocols / Unified Extensible Firmware Interface / Trivial File Transfer Protocol / IPXE / Integer

Zeroshell as TFTP server On June 22 a new update has been released by Fulvio BF22 (June 30, 2013) So now you can install an thin client or a server on network. I was playing with booting SmartOS [www.smartos.org] and ste

DocID: 1qDZ5 - View Document

Computing / Internet Standards / Network booting / Network protocols / Unified Extensible Firmware Interface / Dynamic Host Configuration Protocol / Network service / Trivial File Transfer Protocol / File Transfer Protocol / Preboot Execution Environment

PVS Boot Process Poster v1-5.pdf

DocID: 1qkXg - View Document

Software / Computing / System software / Boot loaders / BIOS / Rootkits / System Management Mode / Concolic testing / Symbolic execution / Unified Extensible Firmware Interface / QEMU / Software testing

Symbolic execution for BIOS security1 Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer2 Intel Corporation May 25, 2015 Abstract We are building a tool that uses symbolic execution to

DocID: 1q1wA - View Document

Computing / Network architecture / Network protocols / Internet Standards / Network booting / Unified Extensible Firmware Interface / Trivial File Transfer Protocol / Units of information / Transmission Control Protocol / User Datagram Protocol / Datagram / Packet loss

Network Working Group Request for Comments: 783 K. R. Sollins MIT June, 1981

DocID: 1pO0H - View Document