We’ve learned a lot about UEFI vulnerabilities over the last few years. Methods to circumvent protections via exploitation or maintain persistence have become more common. While the industry has been able to address this in a few ways, they have been primarily x86-based. So…what about Arm?
Below is our presentation from the Hardwear.io hardware security conference on a novel approach to signing UEFI firmware within the Arm ecosystem: