YoVDO

How Hardware Boundaries Define Platform Security

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Reverse Engineering Courses Malware Analysis Courses Threat Modeling Courses Security Vulnerabilities Courses Firmware Security Courses

Course Description

Overview

Explore the critical intersection of hardware boundaries and platform security in this keynote address from the Hack In The Box Security Conference. Delve into the complexities arising from outsourced hardware components and firmware, examining how these practices impact supply chain security and threat modeling. Gain insights into the limitations hardware vendors face in controlling their platforms and the subsequent security gaps that emerge. Analyze the shortcomings of separating threat models and security boundaries for individual hardware components, and understand how these architectural design flaws affect overall platform security. Learn from Alex Matrosov, a seasoned offensive security researcher with over two decades of experience in reverse engineering, malware analysis, and firmware security, as he illuminates the often-overlooked details in hardware security architecture and their far-reaching implications.

Syllabus

#HITBLockdown002 - KEYNOTE 1 - How Hardware Boundaries Define Platform Security - Alex Matrosov


Taught by

Hack In The Box Security Conference

Related Courses

Activos, amenazas y vulnerabilidades
Google via Coursera
Advanced Cybersecurity Concepts and Capstone Project
Microsoft via Coursera
Securing the IoT Landscape: From Inception to Architecture
LearnQuest via Coursera
Managing IoT Security in Networks
LearnQuest via Coursera
5. アセット、脅威、そして脆弱性
Google via Coursera