Presented at 
Black Hat USA 2016,
          Aug. 4, 2016, 12:10 p.m.
          (50 minutes).
          
          
          
          What if we took the underlying technical elements of Linux containers and used them for evil?  The result a new kind rootkit, which is even able to infect and persist in systems with UEFI secure boot enabled, thanks to the way almost every Linux system boots.  This works without a malicious kernel module and therefore works when kernel module signing is used to prevent loading of unsigned kernel modules.  The infected system has a nearly invisible backdoor that can be remote controlled via a covert network channel.  
 
 Hope is not lost, however!  Come to the talk and see how the risk can be eliminated/mitigated.  While this may poke a stick in the eye of the current state of boot security, we can fix it!
          
          
Presenters:
          
            
            - 
              Michael Leibowitz / @r00tkillah
               - Intel
                  as Michael Leibowitz
              
 Michael Leibowitz (@r00tkillah) has done hard-time in real-time. An old-school computer engineer by education, he spends his days championing product security for a large semiconductor company. Previously, he developed and tested embedded hardware and software, dicked around with strap-on boot roms, mobile apps, office suites, and written some secure software. On nights and weekends he hacks on electronics, writes Blackhat CFPs, and contributes to the NSA Playset.
Links:
          
          
          
          
          Similar Presentations: