Silicon - Security's New Layer
Offered By: nullcon via YouTube
Course Description
Overview
Explore the critical intersection of hardware and software security in this comprehensive conference talk from nullcon Goa 2017. Delve into the often-overlooked realm of silicon security and its implications for overall system protection. Learn why focusing solely on software security is insufficient and how hardware vulnerabilities can undermine even the most robust software defenses. Examine the challenges of hardware security, including supply chain risks, HSM reliability, and FIPS-140 certifications. Discover the need for new methodologies to review hardware components and the tools required to address physical and logical security issues. Gain insights into creating a holistic technical security program that secures your entire technology stack, from silicon to software. The talk covers various topics, including backdoors, supply chain security, embedded systems, chip anatomy, attack techniques, and best practices for designing secure hardware. Understand the importance of securing the supply chain, partner screening, and the challenges posed by the lack of trust in hardware manufacturing.
Syllabus
Introduction
DEFCON
IOActive
Backdoors
Masks
Supply chain security
Threat taxonomy
Case studies
NDS
Nintendo vs Atari
Embedded Security
Smart Cities
Hardware Security
Hardware Labs
Root of Trust
Chip Anatomy
Attackers Toolbox
Blackbox Analysis
Glitch Attack
JTAG
Default passwords
Embedded world
Reactive Ion Etching
Chemical Bath
Polishing
Probe station
Intel chip architecture
We are not hacking
He loves chip hacking
AES Engine
Pro Mutation
Chip Tour
Flash Memory
Billion Gate Problem
Power Conduit
Designing for Security
Best Practices
KERS
Securing supply chain
Partner screening
Assurances
Trusted Foundry Program
Lack of Trust and Supply Chain
Robots
Taught by
nullcon
Related Courses
Hardware SecurityUniversity of Maryland, College Park via Coursera Information Security- II
Indian Institute of Technology Madras via Swayam Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam Cybersecurity
University of Maryland, College Park via Coursera Learning Mobile Device Security
LinkedIn Learning