This blog post is the first in the series about my joint Black Hat research Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller(slides) with Alexandre Gazet presented last week in Vegas. This REsearch took literally 5 months of our spare time to dig into Embedded Controller security and Intel BIOS Guard technology implementation in Lenovo Thinkpad BIOS.

In this blog post, I will focus on the common architectural problem when hardware design doesn’t connect different hardware across the x86-based device to the one unified threat model. Each device has its own threat model and attack surface…

Alex Matrosov

Embedded Security REsearcher with more than two decades of experience in offensive and defensive research. Author of “Rootkits and Bootkits” book (

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store