YoVDO

Eight Crazy Ways to Foil Hardware Attacks - For All Budgets

Offered By: Kaspersky via YouTube

Tags

Conference Talks Courses Embedded Systems Courses Hardware Security Courses Industrial Control Systems Courses JTAG Courses Firmware Security Courses

Course Description

Overview

Explore eight innovative strategies to thwart hardware attacks across various budget levels in this 22-minute conference talk from Kaspersky. Delve into the challenges of securing embedded, IoT, medical, and industrial control devices against firmware exploitation. Examine the effectiveness and cost implications of different hardware countermeasures, backed by data on attack methods and defense implementations. Gain insights into the return on investment for various hardware security approaches, illustrated with real-world examples. Learn about crucial design considerations for embedded devices that offer the most efficient protection against hardware attackers. Discover how to balance security efforts with practical constraints in this comprehensive overview of hardware attack prevention techniques.

Syllabus

Intro
Overview
Hardware Attack
Common Hardware Attacks
JTAG
Firmware
Parallel Flash
Logic Analyzer
Decapping
Common hardware defenses
Disable JTAG
Hardware Encryption
Documentation


Taught by

Kaspersky

Related Courses

I Boot when U-Boot
nullcon via YouTube
The Internet of Insecure Things - 10 Most Wanted List
YouTube
Attacking IOBluetoothFamily HCI and Vendor-Specific Commands
Black Hat via YouTube
Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller
Black Hat via YouTube
Securing Your In-Ear Fitness Coach - Challenges in Hardening Next Generation Wearables
Black Hat via YouTube