Bypassing Secure Boot Using Fault Injection
Offered By: Black Hat via YouTube
Course Description
Overview
Explore fault injection techniques to bypass Secure Boot implementations in embedded systems during this 45-minute Black Hat conference talk. Delve into the challenges of exploiting early stages of Secure Boot, such as ROM or 1st stage bootloader, where logical vulnerabilities may be scarce due to their small size. Learn about alternative approaches to circumvent security measures when traditional logical exploits like SHAtter and limera1n for iPhone boot ROM are not feasible. Gain insights into advanced hardware security concepts and potential weaknesses in Secure Boot mechanisms from speakers Albert Spruyt and Niek Timmers.
Syllabus
Bypassing Secure Boot Using Fault Injection
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network