YoVDO

A Historical Look at Hardware Token Compromises

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Communication Channels Courses

Course Description

Overview

Explore the history of hardware token compromises in this Black Hat USA 2004 conference talk presented by Joe Grand. Delve into the vulnerabilities of various hardware token technologies, including USB and iButton devices. Examine the mechanical and electrical aspects of USB tokens, with a focus on the Aladdin eToken 3.3.3.x and Rainbow iKey 1000. Learn about communication channels, software vulnerabilities, and electrical recommendations for USB tokens. Discover new token technologies and gain insights into the security challenges of iButton devices, particularly the DS1991 Multikey. This comprehensive presentation provides a valuable historical perspective on hardware token security, offering lessons that remain relevant in today's cybersecurity landscape.

Syllabus

Intro
Hardware Tokens: USB
USB: Mechanical
Aladdin e Token 3.3.3.x
USB: Electrical Rainbow iKey 1000
USB: Electrical Recommendations
USB: Software
Communication Channels
USB: New Token Technologies 2
Hardware Tokens: iButton 2
iButton: DS1991 Multikey


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network