Bypassing Secure Boot Using Fault Injection
Offered By: Black Hat via YouTube
Course Description
Overview
Explore fault injection techniques to bypass Secure Boot implementations in embedded systems during this 45-minute Black Hat conference talk. Delve into the challenges of exploiting early stages of Secure Boot, such as ROM or 1st stage bootloader, where logical vulnerabilities may be scarce due to their small size. Learn about alternative approaches to circumvent security measures when traditional logical exploits like SHAtter and limera1n for iPhone boot ROM are not feasible. Gain insights into advanced hardware security concepts and potential weaknesses in Secure Boot mechanisms from speakers Albert Spruyt and Niek Timmers.
Syllabus
Bypassing Secure Boot Using Fault Injection
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube