YoVDO

Pwning ARM Debug Components

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Embedded Systems Courses Computer Security Courses Software Security Courses Hardware Security Courses ARM Architecture Courses

Course Description

Overview

Explore an innovative approach to ARM security in this conference talk from the Hack In The Box Security Conference. Dive into the world of ARM debug components and discover how they can be leveraged not only for information flow tracking but also for implementing various security primitives. Learn about the evolution of security vulnerabilities and the ongoing battle between security developers and attackers. Understand the importance of runtime behavior verification in computer security, with a focus on techniques like Information Flow Tracking (IFT). Examine the differences between Static Information Flow Tracking (SIFT) and Dynamic Information Flow Tracking (DIFT), and gain insights into the three key operations of DIFT: tag initialization, tag propagation, and tag checking. Presented by Muhammad Abdul Wahab, a PhD student specializing in embedded systems, software/hardware security, and FPGA reconfiguration, this 26-minute talk offers valuable knowledge for those interested in ARM security and advanced protection mechanisms.

Syllabus

#HITB2017AMS COMMSEC D2 - Pwning ARM Debug Components - Muhammad Abdul Wahab


Taught by

Hack In The Box Security Conference

Related Courses

Information Security- II
Indian Institute of Technology Madras via Swayam
Embedded Systems Essentials with Arm: Getting Started
Arm Education via edX
ARM Based Development
NPTEL via YouTube
Introduction to STM32 - 32-bit ARM-Based Microcontroller
Udemy
Embedded Linux using Yocto
Udemy