The Tao of Hardware - The Te of Implants
Offered By: Black Hat via YouTube
Course Description
Overview
Explore hardware security vulnerabilities and implant techniques in a 43-minute Black Hat conference talk. Delve into the world of embedded, IoT, and ICS devices, examining how even software security experts often overlook hardware attacks. Discover cheap and easy methods to subvert hardware, including techniques validated by the leaked ANT catalog and NSA Playset projects. Learn about five simple hardware implants that demonstrate various attack vectors, such as privilege escalation using JTAG, kernel patching via direct memory access, wireless control of PLC inputs and outputs, hot-plugging malicious expansion modules, and system subversion through display adapters. Gain insights into potential design decisions to reduce implant vulnerabilities and ways to protect existing hardware systems from tampering. This talk by Joe FitzPatrick provides valuable knowledge for both security professionals and hardware enthusiasts interested in understanding and mitigating hardware-based threats.
Syllabus
The Tao of Hardware the Te of Implants
Taught by
Black Hat
Related Courses
Systems & Network SecurityChaffey College via California Community Colleges System Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX Developing Secure IoT Applications
EDUCBA via Coursera Essential Aspects of Software, Hardware, and Data Backup
Microsoft via Coursera Cybersecurity
University of Maryland, College Park via Coursera