YoVDO

Reverse Engineering the Customized Pointer Authentication Hardware Implementation on Apple M1

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Reverse Engineering Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into a 40-minute Black Hat conference talk that uncovers the mysteries behind Apple's customized Pointer Authentication (PA) hardware implementation on the M1 chip. Explore how researchers reverse-engineered this security feature, which has been deployed on all Apple-silicon-based products since 2018. Learn about the "dark magic" discovered by Brandon Azad in 2019 that allows Apple's PA to defend against cross-EL/Key attacks without software support. Understand the progress made in revealing the causes of these cross-attack mitigations, four years after the initial discovery. Gain insights from the research team's findings on the inner workings of Apple's PA hardware and its implications for system security.

Syllabus

Reverse Engineering the Customized Pointer Authentication Hardware Implementation on Apple M1


Taught by

Black Hat

Related Courses

Dal Reverse engineering alla stampa 3D
University of Naples Federico II via Federica
Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam
Generative Design for Industrial Applications
Autodesk via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam