Pwning ARM Debug Components
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore an innovative approach to ARM security in this conference talk from the Hack In The Box Security Conference. Dive into the world of ARM debug components and discover how they can be leveraged not only for information flow tracking but also for implementing various security primitives. Learn about the evolution of security vulnerabilities and the ongoing battle between security developers and attackers. Understand the importance of runtime behavior verification in computer security, with a focus on techniques like Information Flow Tracking (IFT). Examine the differences between Static Information Flow Tracking (SIFT) and Dynamic Information Flow Tracking (DIFT), and gain insights into the three key operations of DIFT: tag initialization, tag propagation, and tag checking. Presented by Muhammad Abdul Wahab, a PhD student specializing in embedded systems, software/hardware security, and FPGA reconfiguration, this 26-minute talk offers valuable knowledge for those interested in ARM security and advanced protection mechanisms.
Syllabus
#HITB2017AMS COMMSEC D2 - Pwning ARM Debug Components - Muhammad Abdul Wahab
Taught by
Hack In The Box Security Conference
Related Courses
Embedded Systems - Shape The World: Microcontroller Input/OutputThe University of Texas at Austin via edX Model Checking
Chennai Mathematical Institute via Swayam Introduction to the Internet of Things and Embedded Systems
University of California, Irvine via Coursera Sistemas embebidos: Aplicaciones con Arduino
Universidad Nacional Autónoma de México via Coursera Quantitative Formal Modeling and Worst-Case Performance Analysis
EIT Digital via Coursera