YoVDO

Self-Encrypting Deception

Offered By: media.ccc.de via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Encryption Courses Data Protection Courses

Course Description

Overview

Explore critical weaknesses in hardware full-disk encryption implementations of Self-Encrypting Drives (SEDs) from major manufacturers Samsung and Crucial. Dive into the reverse engineering of SED firmwares, uncovering vulnerabilities that allow complete data recovery without knowledge of any secret. Learn how BitLocker, Windows' built-in encryption software, can be compromised when relying on hardware encryption. Examine the challenges to the notion that hardware-based full-disk encryption is superior to software implementations. Understand the implications for data protection regulations and the limitations of purely software-based encryption. Discover the methodology used to analyze SEDs, including case studies and demonstrations of exploits. Gain insights into the standards, pitfalls, and future considerations for secure data storage in this eye-opening 59-minute conference talk from the 35th Chaos Communication Congress.

Syllabus

Intro
What is selfencrypting
Security guarantees
Standards
Pitfalls
Methodology
Case Studies
Demo
Flashing
VirtualBox
Questions


Taught by

media.ccc.de

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube