U/OO/181562-19 PP-19-1043 AUGUST 2019
REFERENCES
[1] A. Ionescu, Slide presentation, Topic: “Advancing the State of UEFI Boot Kits,” presented at OffensiveCon, Berlin, Germany, Feb. 16—17, 2018.
Available: http://www.alex-ionescu.com/publications/OffensiveCon/offensive2018.pdf [Accessed 01 March, 2019]
[2] S. Gallagher, “First UEFI malware discovered in wild is laptop security software hijacked by Russians,” Ars Technica, 02 October, 2018. Available:
https://arstechnica.com/information-technology/2018/10/first-uefi-malware-discovered-in-wild-is-laptop-security-software-hijacked-by-russians
[Accessed 01 March 2019]
[3] A. Greenberg, “Software has a serious supply-chain security problem,” Wired, 18 September 2017. [Online] Available:
https://www.wired.com/story/ccleaner-malware-supply-chain-software-security [Accessed 01 March 2019]
[4] J. Sutherland, et al. “Windows Defender Application Control,” Microsoft, 07 January, 2019. Available: https://docs.microsoft.com/en-
us/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control [Accessed 01 March, 2019]
[5] J. Hall, L. Poggemeyer, “AppLocker,” Microsoft, 15 October, 2017. Available: https://docs.microsoft.com/en-us/windows/security/threat-
protection/windows-defender-application-control/applocker/applocker-overview [Accessed 01 March, 2019]
[6] E. Graff, et al. “Secure boot,” Microsoft, 04 October, 2017. Available: https://docs.microsoft.com/en-us/windows-hardware/design/device-
experiences/oem-secure-boot [Accessed 01 March, 2019]
[7] J. Hall, et al. “Secure the Windows 10 boot process,” Microsoft, 15 November, 2018. Available: https://docs.microsoft.com/en-
us/windows/security/information-protection/secure-the-windows-10-boot-process [Accessed 01 March, 2019]
[8] Apple, “Safely open apps on your Mac,” 25 September, 2018. Available: https://support.apple.com/en-us/HT202491 [Accessed 01 March, 2019]
[9] Apple, “About System Integrity Protection on your Mac,” 07 November 2017. Available: https://support.apple.com/en-us/HT204899 [Accessed 01
March, 2019]
[10] Apple, “About the Apple T2 Security Chip,” 06 February, 2019. Available: https://support.apple.com/en-us/HT208862 [Accessed 01 March, 2019]
[11] Apple, “About Secure Boot,” 06 November, 2018. Available: https://support.apple.com/en-us/HT208330 [Accessed 01 March, 2019]
[12] Red Hat, “How to sign rpms with GPG,” 22 February 2018. Available: https://access.redhat.com/articles/3359321 [Accessed 01 March, 2019]
[13] M. Doleželová, et al, “Unified Extensible Firmware Interface (UEFI) Secure Boot,” in System Administrator’s Guide: Deployment, Configuration, and
Administration of Red Hat Enterprise Linux 7, ch. 25.11, Red Hat. Available: https://access.redhat.com/documentation/en-
us/red_hat_enterprise_linux/7/html/system_administrators_guide/sec-uefi_secure_boot [Accessed 01 March 2019]
[14] Apple, iOS Security Guide, November, 2018. Available: https://www.apple.com/business/site/docs/iOS_Security_Guide.pdf [Accessed 01 March,
2019]
[15] Android Developers, “Sign your app,” Android Studio User Guide. Available: https://developer.android.com/studio/publish/app-signing [Accessed 01
March, 2019]
[16] Android Source, “Verified Boot,” AOSP, Secure, Features. Available: https://source.android.com/security/verifiedboot [Accessed 01 March 2019]
DISCLAIMER OF WARRANTIES AND ENDORSEMENT
The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any
specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement,
recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.
CONTACT INFORMATION
Client Requirements and General Cybersecurity Inquiries
Cybersecurity Re
quirements Cen
ter (C
RC), 410-
854-4200, email:
Cybersecurity_Re[email protected]