Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Analog Malicious Hardware
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Software security success forces attackers to lower layers
- 3 Dynamic Static Analysis
- 4 Challenge: construct an attack that is stealthy and small
- 5 Two threats, we focus on the stage that restricts the attacker the most
- 6 We leverage analog behavior to construct an attack that is stealthy and small
- 7 An ideal analog trigger
- 8 Challenge: small capacitors charge quickly, large capacitors induce current spikes
- 9 Solution: charge sharing
- 10 Creating an analog trigger using gated charge sharing
- 11 Creating a privilege escalation attack Our analog trigger is attack agnostic
- 12 Implanting A2 into an existing chip layout