Below the Surface (Audio) - The Supply Chain Security Podcast cover art

Below the Surface (Audio) - The Supply Chain Security Podcast

Below the Surface (Audio) - The Supply Chain Security Podcast

Written by: Eclypsium
Listen for free

About this listen

A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions. Get the Supply Chain Security Toolkit from Eclypsium here: https://eclypsium.com/go© 2024 Eclypsium, Inc Economics
Episodes
  • BIOS Password Cracking, Secure Boot, and Stackwarp - BTS #67
    Jan 27 2026

    In this episode, the hosts discuss various cybersecurity topics, including the challenges of BIOS password cracking, the implications of AMD's Stack Warp vulnerability, and the importance of up-to-date secure boot certificates. They also explore the risks associated with network security appliances, the costs of cybersecurity, and the role of marketing in raising awareness. Additionally, they share insights from an X-ray analysis of USB cables, highlighting the differences between quality and counterfeit products.

    • BIOS password cracking can be complex and time-consuming.
    • Physical access to hardware can significantly impact security measures.
    • The Stack Warp vulnerability poses serious risks to virtual machines.
    • Secure boot certificates need regular updates to maintain security.
    • Network security appliances can introduce new vulnerabilities.
    • Cybersecurity costs often outweigh the perceived benefits of cloud solutions.
    • Marketing plays a crucial role in raising awareness about cybersecurity issues.
    • X-ray analysis can reveal the quality of electronic components.
    • Understanding the shared responsibility model is essential for IT teams.
    • The balance between security and operational efficiency is a constant challenge.

    Chapters

    01:59 Introduction to Below the Surface Podcast

    04:46 BIOS Password Cracking Techniques

    10:14 Exploring AMD's Stack Warp Vulnerability

    22:03 Migration Trends in Cloud Computing

    23:22 Cost vs. Security in On-Premises Solutions

    24:37 Shared Responsibility in Network Security Appliances

    27:03 The Risks of Network Security Appliances

    28:14 Exploitation of Vulnerabilities in Network Devices

    31:18 Challenges in Updating Network Security Appliances

    34:59 The Slow Response to Vulnerabilities

    39:05 The Complexity of Firmware Updates

    45:45 Secure Boot Certificates and Future Vulnerabilities

    49:12 Fun Innovations: X-ray Machine in the Office

    Show More Show Less
    1 hr
  • Beyond the Label: The Truth About Hardware Trust - BTS #66
    Jan 15 2026

    In this episode of Below the Surface, host Paul Asadoorian is joined by co-hosts Larry Pesci, Joshua Marpet, and Vlad Babkin to delve into the complexities of hardware supply chain security. The discussion is sparked by a presentation from Andrew 'Bunny' Wong at Black Hat Asia, which raised critical questions about how we can trust the silicon in our devices. The conversation explores the challenges of validating hardware components, the potential for backdoors in devices, and the implications of counterfeit components in the supply chain. The hosts share anecdotes and insights about their experiences with hardware security, emphasizing the need for independent testing and the importance of understanding the provenance of hardware components.

    00:00 Introduction to Hardware Supply Chain Security

    02:53 Understanding Trust in Silicon

    05:55 Challenges in Validating Hardware Components

    09:01 Historical Context of Hardware Tampering

    11:58 The Complexity of Supply Chains

    14:55 Operationalizing Hardware Validation

    18:01 The Role of Independent Researchers

    20:59 Bounties and Community Involvement

    23:56 Innovative Techniques for Hardware Analysis

    27:06 The Future of Hardware Security

    31:57 The Evolution of Computing: From Transistors to Quantum

    36:11 Understanding Hardware Trust and Supply Chain Risks

    41:52 The Need for Continuous Monitoring and Assurance

    55:31 The Future of High Assurance Devices and Backdoors

    Show More Show Less
    57 mins
  • Exploring AI in Firmware Analysis - BTS #65
    Dec 15 2025

    Summary

    In this episode, special guest Matt Brown joins us to discuss the integration of AI in firmware analysis, exploring its benefits and challenges. We delve into the transition from traditional methods to AI-driven approaches, emphasizing the importance of prompt specificity for effective vulnerability discovery. The conversation also covers the role of open-source components, the need for guardrails in AI use, and the implications of AI-generated reports in cybersecurity. Additionally, they touch on man-in-the-middle techniques and the future of AI in firmware development, highlighting the creative monetization of vulnerabilities in IoT devices.


    Takeaways

    * AI is revolutionizing firmware analysis and vulnerability discovery.
    * Specificity in prompts is crucial for effective AI usage.
    * Open-source components can enhance analysis results significantly.
    * Guardrails are necessary to prevent AI from executing harmful commands.
    * AI can assist in code refactoring and documentation generation.
    * NTP spoofing can reveal vulnerabilities in time-sensitive applications.
    * AI-generated reports may lead to false positives in vulnerability assessments.
    * Man-in-the-middle techniques are essential for testing device security.
    * The future of AI in firmware development is promising but complex.
    * Understanding the context of vulnerabilities is key to accurate reporting.

    Chapters

    00:00 Introduction to Firmware Analysis and AI Tools
    01:54 Transitioning from Traditional Tools to AI
    04:28 Specific Techniques for Vulnerability Discovery
    06:29 Dynamic Analysis vs. Static Analysis
    08:30 Using AI for Code Generation and Documentation
    11:43 Interacting with Firmware and Devices
    15:57 Creating Custom Tools and Skills for AI
    18:53 Recent Projects and Use Cases in Firmware Analysis
    22:48 Challenges and Risks of Using AI in Security Research
    28:36 The Future of AI in Firmware Development
    29:43 AI in Code Review and Vulnerability Detection
    33:35 Limitations of AI in Understanding Logic
    37:54 Challenges with AI-Generated Vulnerability Reports
    43:13 Man-in-the-Middle Techniques and Tools
    53:24 Exploring IoT Device Vulnerabilities

    Show More Show Less
    1 hr and 1 min
No reviews yet