Copernicus 2: SENTER the Dragon!

By Xeno Kovah , John Butterworth , Corey Kallenberg , Sam Cornwell

This presentation addresses attacks on firmware by detailing a proof-of-concept attack in which a BIOS-infecting attacker can perform a Man-in-the-middle attack against the SMM (System Management Mode).

Download Resources


PDF Accessibility

One or more of the PDF files on this page fall under E202.2 Legacy Exceptions and may not be completely accessible. You may request an accessible version of a PDF using the form on the Contact Us page.

In this presentation we address attacks on firmware by detailing a proof-of-concept attack in which a BIOS-infecting attacker can perform a Man-in-the-middle attack against the SMM (System Management Mode). Because this type of attack could go undetected, we show how the next generation of Copernicus, a tool used to inspect BIOS, can be used to detect this type of stealthy cyber attack.​