{"id":12247,"date":"2023-05-18T05:27:20","date_gmt":"2023-05-18T05:27:20","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/"},"modified":"2023-06-12T08:45:42","modified_gmt":"2023-06-12T08:45:42","slug":"x86-64-intel-firmware-attack-defense-hitb2023hkt","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/","title":{"rendered":"x86-64 Intel Firmware Attack &amp; Defense"},"content":{"rendered":"<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h4><strong><span style=\"color: #993300\">ATTEND IN-PERSON<\/span><\/strong><strong><span style=\"color: #993300\">: <\/span><\/strong><strong>Onsite in Phuket<\/strong><\/h4>\n<h4><strong><span style=\"color: #993300\">ATTEND ONLINE<\/span><\/strong><strong><span style=\"color: #993300\">: <\/span><\/strong><strong>Virtual via Zoom and Discord<\/strong><\/h4>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<div class=\"page\" title=\"Page 3\">\n<h4><strong>DATE: 21-22 August 2023<\/strong><\/h4>\n<\/div>\n<h4><strong>TIME: 09:00 to 17:00 ICT\/GMT+7<\/strong><\/h4>\n<table style=\"height: 146px\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>21 Aug<\/td>\n<td>Monday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>22 Aug<\/td>\n<td>Tuesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr \/>\n<p style=\"text-align: left\"><strong><span style=\"color: #993300\"><em><a href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/xenos-all-you-can-learn-buffet-4day-hitb2023hkt\/\">Go HERE<\/a> to take this class as a 4-Day Buffet course.<br \/>\n<a href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/xenos-all-you-can-learn-buffet-3day-hitb2023hkt\/\">Go HERE<\/a> to take this class as a 3-Day Buffet course.<br \/>\n<a href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-assembly-hitb2023hkt\/\">Go HERE<\/a> to join just the x86-64 assembly class.<br \/>\n<a href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-os-internals-hitb2023hkt\/\">Go HERE<\/a> to join just the x86-64 OS internals class.<br \/>\n<\/em><\/span><\/strong><\/p>\n<hr \/>\n<h5 class=\"p1\">This class is run a little different from most classes. We provide you purpose-built recorded lectures instead of trapping you in realtime with live-lectures. But fear not, the instructor is always right there eagerly waiting to mingle with the students and answer any questions you have. (The instructor really likes being asked questions. It shows you&#8217;re paying attention ;)). One of many benefits is that you can watch lectures at 2x speed and zoom ahead of the other students and get to the hands on labs quicker. Or if there&#8217;s bits of material you already know, you can just skip them and move on to the bits you don&#8217;t know! Another big benefit is that you get to take the full lectures and labs with you! That means if you forget stuff and then need it in 6 months, you can quickly re-bootstrap yourself! Or you can watch the class twice, to really grow those neural connections and cement it in your brain! And unlike live lectures, our lectures are always getting more factually accurate, by having any accidental errors edited out.<\/h5>\n<p class=\"p1\">Because we give you all the lecture and lab materials and videos after class, what you&#8217;re really paying for is support from the instructor! So you&#8217;ll be entitled to keep asking up to 20 questions after class, with 1-2 hour turnaround answers (after accounting for time-zone differences.) This lets you keep productively working through the material if you run out of time at the conference. If you&#8217;d like to learn more about the benefits of this style of class delivery, please read this <a href=\"https:\/\/ost2.fyi\/Thoughts-on-OST2-B.html\">blog post.<\/a><\/p>\n<p>&nbsp;<\/p>\n<h5 class=\"p1\"><b>Key Learning Objectives<\/b><\/h5>\n<ul>\n<li class=\"p1\">Understand the original 16-bit &#8220;Real Mode&#8221; which the x86 CPU reset vector executes in.<\/li>\n<li class=\"p1\">Understand 16-bit segmentation &amp; assembly.<\/li>\n<li class=\"p1\">Understand the evolution of Intel chipsets, and how to find the manual which corresponds to any given hardware.<\/li>\n<li class=\"p1\">Understand how firmware uses IO to configure Intel and 3rd party hardware at boot time.<\/li>\n<li class=\"p1\">Understand how firmware interacts with PCIe devices at boot time, both within the CPU\/chipset, and 3rd party peripherals.<\/li>\n<li class=\"p1\">Understand the core purposes of PCIe Option ROMs, but also how they can be used by attackers.<\/li>\n<li class=\"p1\">Being capable of manually reading\/writing the firmware-storage SPI flash through the register interface.<\/li>\n<li class=\"p1\">Understand the protection mechanisms for the SPI flash and how they can be bypassed.<\/li>\n<li class=\"p1\">Understand the protection mechanisms for System Management Mode how they can be bypassed.<\/li>\n<li class=\"p1\">Understand how Chipsec can be used to assess the security posture of a firmware for both attack and defense.<\/li>\n<li class=\"p1\">Understand how the ACPI S3 &#8220;sleep&#8221; power state can be used to attack systems.<\/li>\n<li class=\"p1\">Being comfortable with Reading The Fun Manual(!) to go seek out the most accurate details of how things work.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5 class=\"p1\"><b>What Students say about this training<\/b><\/h5>\n<blockquote>\n<p class=\"p1\"><em><span class=\"s1\">SO much visualization; there is zero &#8220;wall of texts&#8221; slides.<\/span><\/em><\/p>\n<p class=\"p1\"><em><span class=\"s1\">I loved the threat trees and explanations that went along with them, the more narrative approach made it easy to stay engaged.<\/span><\/em><\/p>\n<p class=\"p1\"><em><span class=\"s1\">I like that it&#8217;s progressive and well taught with lots of tricks to make the material less dry<\/span><\/em><\/p>\n<p class=\"p1\"><em><span class=\"s1\">Really enjoyed the mix of lecture with some practical investigation on hardware with Chipsec.<\/span><\/em><\/p>\n<p class=\"p1\"><em><span class=\"s1\">The animated diagrams and humor mixed in with the slides worked really well for communicating how memory and registers were arranged and how bytes and nibbles split into different fields.<\/span><\/em><\/p>\n<p class=\"p1\"><em><span class=\"s1\">The \u201cgo forth and read things you will now understand better\u201d research unlocked sections were great motivation for learning new things and letting me dive into rabbit holes of neat information.<\/span><\/em><\/p>\n<p class=\"p1\"><em><span class=\"s1\">The explanation of how the manuals are organized and how to find information in them along with the little fact lookup missions are so valuable, especially with Intel manuals.<\/span><\/em><\/p>\n<p class=\"p1\"><em><span class=\"s1\">I really enjoyed this class and the material. I will be referring to it frequently I am sure. I am also thankful for the collection of data sheets in the gitlab repo. That is a nice touch and I&#8217;m sure it took a long time to collect and organize.<\/span><\/em><\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<h5 class=\"p1\"><b>Topics covered<\/b><\/h5>\n<p><strong>Introduction<\/strong><\/p>\n<ul>\n<li>Attacker motivations &amp; capabilities<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Reset Vector<\/strong><\/p>\n<ul>\n<li>The &#8220;Real Mode&#8221; execution environment<\/li>\n<li>Reading reset vector assembly and the transitions to &#8220;Protected Mode&#8221;<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Chipsets<\/strong><\/p>\n<ul>\n<li>The evolution of the platform architecture<\/li>\n<li>Finding the correct manual for the hardware you bring to class, to find the correct offsets to memory mapped IO registers for the rest of the class<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Input\/Output<\/strong><\/p>\n<ul>\n<li>Memory Mapped IO (MMIO) as used by firmware<\/li>\n<li>Port IO (PIO) as used by firmware<\/li>\n<li>Hardware-defined vs. reconfigurable memory spaces<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>PCIe <\/strong><\/p>\n<ul>\n<li>Evolution, topology, and usage by firmware<\/li>\n<li>Configuration address space MMIO vs. PIO accesses<\/li>\n<li>Base address registers &amp; extended configuration address space<\/li>\n<li>&#8220;Option ROMs&#8221; and how they&#8217;ve been repeatedly used for attacks<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>SPI Flash<\/strong><\/p>\n<ul>\n<li>Introduction &amp; supported SPI operation modes on x86<\/li>\n<li>MMIO register-based SPI flash programming interface<\/li>\n<li>SPI flash layout &amp; the Intel flash descriptor<\/li>\n<li>SPI protection threat tree, moves and counter-moves<\/li>\n<li>&#8211; Protected Range Registers (PRRs) and bypasses like failure to FLOCKDN + sleep attacks<\/li>\n<li>&#8211; SMM-based BIOS Lockdown and bypasses like SMI Suppression + sleep attacks<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>System Management Mode (SMM)<\/strong><\/p>\n<ul>\n<li>Introduction &amp; System Management Interrupts (SMIs)<\/li>\n<li>System Management RAM (SMRAM) &amp; the protection thereof<\/li>\n<li>SMM threat tree, moves and counter-moves:<\/li>\n<li>&#8211; Caching Attacks<\/li>\n<li>&#8211; Remapping Attacks<\/li>\n<li>&#8211; SMM Call-Out Vulnerabilities<\/li>\n<li>&#8211; SMM Confused Deputy Attacks<\/li>\n<li>&#8211; SMM TOCTOU Attacks<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Power-transition attacks<\/strong><\/p>\n<ul>\n<li>x86 ACPI S3 low-power sleep effects on SPI &amp; SMM protection<\/li>\n<li>Attacks exploiting S3 sleep states<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<h5 style=\"text-align: left\"><span style=\"color: #993300\"><em><a href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/xenos-all-you-can-learn-buffet-4day-hitb2023hkt\/\">Go HERE<\/a> to take this class as a 4-Day Buffet course.<br \/>\n<a href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/xenos-all-you-can-learn-buffet-3day-hitb2023hkt\/\">Go HERE<\/a> to take this class as a 3-Day Buffet course.<br \/>\n<a href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-assembly-hitb2023hkt\/\">Go HERE<\/a> to join just the x86-64 assembly class.<br \/>\n<a href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-os-internals-hitb2023hkt\/\">Go HERE<\/a><\/em><\/span><span style=\"color: #993300\"><em> to join just the x86-64 OS internals class.<\/em><\/span><strong><span style=\"color: #993300\"><em><br \/>\n<\/em><\/span><\/strong><\/h5>\n","protected":false},"excerpt":{"rendered":"<p>ATTEND IN-PERSON: Onsite in Phuket ATTEND ONLINE: Virtual via Zoom and Discord DATE: 21-22 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours Go HERE to take this class as a 4-Day Buffet course. Go HERE to take this [&hellip;]<\/p>\n","protected":false},"featured_media":12246,"template":"","meta":{"_acf_changed":false},"product_cat":[79,77],"product_tag":[],"class_list":{"0":"post-12247","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-guided-own-pace","7":"product_cat-hitb2023hkt","9":"first","10":"instock","11":"featured","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>x86-64 Intel Firmware Attack &amp; Defense - HITB (in)Cyber 2024 - Abu Dhabi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"x86-64 Intel Firmware Attack &amp; Defense - HITB (in)Cyber 2024 - Abu Dhabi\" \/>\n<meta property=\"og:description\" content=\"ATTEND IN-PERSON: Onsite in Phuket ATTEND ONLINE: Virtual via Zoom and Discord DATE: 21-22 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours Go HERE to take this class as a 4-Day Buffet course. Go HERE to take this [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/\" \/>\n<meta property=\"og:site_name\" content=\"HITB (in)Cyber 2024 - Abu Dhabi\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-12T08:45:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/x86-64-Intel-Firmware-Attack-Defense.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"810\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/\",\"name\":\"x86-64 Intel Firmware Attack &amp; Defense - HITB (in)Cyber 2024 - Abu Dhabi\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/x86-64-Intel-Firmware-Attack-Defense.gif\",\"datePublished\":\"2023-05-18T05:27:20+00:00\",\"dateModified\":\"2023-06-12T08:45:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/x86-64-Intel-Firmware-Attack-Defense.gif\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/x86-64-Intel-Firmware-Attack-Defense.gif\",\"width\":1080,\"height\":810},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"x86-64 Intel Firmware Attack &amp; Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/\",\"name\":\"HITB (in)Cyber 2024 - Abu Dhabi\",\"description\":\"May 14 - 16, Etihad Arena \",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"x86-64 Intel Firmware Attack &amp; Defense - HITB (in)Cyber 2024 - Abu Dhabi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/","og_locale":"en_US","og_type":"article","og_title":"x86-64 Intel Firmware Attack &amp; Defense - HITB (in)Cyber 2024 - Abu Dhabi","og_description":"ATTEND IN-PERSON: Onsite in Phuket ATTEND ONLINE: Virtual via Zoom and Discord DATE: 21-22 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours Go HERE to take this class as a 4-Day Buffet course. Go HERE to take this [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/","og_site_name":"HITB (in)Cyber 2024 - Abu Dhabi","article_modified_time":"2023-06-12T08:45:42+00:00","og_image":[{"width":1080,"height":810,"url":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/x86-64-Intel-Firmware-Attack-Defense.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/","url":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/","name":"x86-64 Intel Firmware Attack &amp; Defense - HITB (in)Cyber 2024 - Abu Dhabi","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/x86-64-Intel-Firmware-Attack-Defense.gif","datePublished":"2023-05-18T05:27:20+00:00","dateModified":"2023-06-12T08:45:42+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/x86-64-Intel-Firmware-Attack-Defense.gif","contentUrl":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/05\/x86-64-Intel-Firmware-Attack-Defense.gif","width":1080,"height":810},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/x86-64-intel-firmware-attack-defense-hitb2023hkt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbincyber2024\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbincyber2024\/shop\/"},{"@type":"ListItem","position":3,"name":"x86-64 Intel Firmware Attack &amp; Defense"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/#website","url":"https:\/\/conference.hitb.org\/hitbincyber2024\/","name":"HITB (in)Cyber 2024 - Abu Dhabi","description":"May 14 - 16, Etihad Arena ","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbincyber2024\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product\/12247"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/media\/12246"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/media?parent=12247"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product_cat?post=12247"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product_tag?post=12247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}