YoVDO

Pwning ARM Debug Components

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Embedded Systems Courses Computer Security Courses Software Security Courses Hardware Security Courses ARM Architecture Courses

Course Description

Overview

Explore an innovative approach to ARM security in this conference talk from the Hack In The Box Security Conference. Dive into the world of ARM debug components and discover how they can be leveraged not only for information flow tracking but also for implementing various security primitives. Learn about the evolution of security vulnerabilities and the ongoing battle between security developers and attackers. Understand the importance of runtime behavior verification in computer security, with a focus on techniques like Information Flow Tracking (IFT). Examine the differences between Static Information Flow Tracking (SIFT) and Dynamic Information Flow Tracking (DIFT), and gain insights into the three key operations of DIFT: tag initialization, tag propagation, and tag checking. Presented by Muhammad Abdul Wahab, a PhD student specializing in embedded systems, software/hardware security, and FPGA reconfiguration, this 26-minute talk offers valuable knowledge for those interested in ARM security and advanced protection mechanisms.

Syllabus

#HITB2017AMS COMMSEC D2 - Pwning ARM Debug Components - Muhammad Abdul Wahab


Taught by

Hack In The Box Security Conference

Related Courses

Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera
Engineering Maintainable Android Apps
Vanderbilt University via Coursera
Software Design as an Element of the Software Development Lifecycle
University of Colorado System via Coursera
Secure Software Development
Pluralsight
Secure Software Concepts for CSSLPĀ®
Pluralsight