YoVDO

Hardware Attack Vectors

Offered By: nullcon via YouTube

Tags

nullcon Courses Computer Security Courses Hardware Security Courses

Course Description

Overview

Explore hardware-based attack vectors in this 58-minute conference talk from nullcon Goa 2014. Delve into lesser-known aspects of computer security, focusing on hardware vulnerabilities when traditional methods prove impractical or impossible. Examine various attack techniques, including HID Vector, IR Vector, Radio, and Bus protocol attacks, with brief descriptions and demonstrations for each. Gain insights into situations where hardware-based approaches may succeed where other security measures fail. Learn about the challenges and potential of hardware security in the broader context of cybersecurity strategies.

Syllabus

nullcon Goa 2014: Hardware Attack Vectors by @YashinMehaboobe


Taught by

nullcon

Related Courses

Unearthing Malicious and Risky OpenSource Packages Using Packj
nullcon via YouTube
Pushing Security Left by Mutating Byte Code
nullcon via YouTube
The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
Mind The Gap - The Linux Ecosystem Kernel Patch Gap
nullcon via YouTube