YoVDO

Silicon - Security's New Layer

Offered By: nullcon via YouTube

Tags

nullcon Courses Software Security Courses Hardware Security Courses Supply Chain Security Courses Vulnerability Assessment Courses

Course Description

Overview

Explore the critical intersection of hardware and software security in this comprehensive conference talk from nullcon Goa 2017. Delve into the often-overlooked realm of silicon security and its implications for overall system protection. Learn why focusing solely on software security is insufficient and how hardware vulnerabilities can undermine even the most robust software defenses. Examine the challenges of hardware security, including supply chain risks, HSM reliability, and FIPS-140 certifications. Discover the need for new methodologies to review hardware components and the tools required to address physical and logical security issues. Gain insights into creating a holistic technical security program that secures your entire technology stack, from silicon to software. The talk covers various topics, including backdoors, supply chain security, embedded systems, chip anatomy, attack techniques, and best practices for designing secure hardware. Understand the importance of securing the supply chain, partner screening, and the challenges posed by the lack of trust in hardware manufacturing.

Syllabus

Introduction
DEFCON
IOActive
Backdoors
Masks
Supply chain security
Threat taxonomy
Case studies
NDS
Nintendo vs Atari
Embedded Security
Smart Cities
Hardware Security
Hardware Labs
Root of Trust
Chip Anatomy
Attackers Toolbox
Blackbox Analysis
Glitch Attack
JTAG
Default passwords
Embedded world
Reactive Ion Etching
Chemical Bath
Polishing
Probe station
Intel chip architecture
We are not hacking
He loves chip hacking
AES Engine
Pro Mutation
Chip Tour
Flash Memory
Billion Gate Problem
Power Conduit
Designing for Security
Best Practices
KERS
Securing supply chain
Partner screening
Assurances
Trusted Foundry Program
Lack of Trust and Supply Chain
Robots


Taught by

nullcon

Related Courses

Unearthing Malicious and Risky OpenSource Packages Using Packj
nullcon via YouTube
Pushing Security Left by Mutating Byte Code
nullcon via YouTube
The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
Mind The Gap - The Linux Ecosystem Kernel Patch Gap
nullcon via YouTube