YoVDO

Hardware Attack Vectors

Offered By: nullcon via YouTube

Tags

nullcon Courses Computer Security Courses Hardware Security Courses

Course Description

Overview

Explore hardware-based attack vectors in this 58-minute conference talk from nullcon Goa 2014. Delve into lesser-known aspects of computer security, focusing on hardware vulnerabilities when traditional methods prove impractical or impossible. Examine various attack techniques, including HID Vector, IR Vector, Radio, and Bus protocol attacks, with brief descriptions and demonstrations for each. Gain insights into situations where hardware-based approaches may succeed where other security measures fail. Learn about the challenges and potential of hardware security in the broader context of cybersecurity strategies.

Syllabus

nullcon Goa 2014: Hardware Attack Vectors by @YashinMehaboobe


Taught by

nullcon

Related Courses

Securing Digital Democracy
University of Michigan via Coursera
Computer Science 101
Stanford University via Coursera
Introduction to Cybersecurity for Business
University of Colorado System via Coursera
Proactive Computer Security
University of Colorado System via Coursera
How Computers Work
University of London International Programmes via Coursera