Completed
Two threats, we focus on the stage that restricts the attacker the most
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Analog Malicious Hardware
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Software security success forces attackers to lower layers
- 3 Dynamic Static Analysis
- 4 Challenge: construct an attack that is stealthy and small
- 5 Two threats, we focus on the stage that restricts the attacker the most
- 6 We leverage analog behavior to construct an attack that is stealthy and small
- 7 An ideal analog trigger
- 8 Challenge: small capacitors charge quickly, large capacitors induce current spikes
- 9 Solution: charge sharing
- 10 Creating an analog trigger using gated charge sharing
- 11 Creating a privilege escalation attack Our analog trigger is attack agnostic
- 12 Implanting A2 into an existing chip layout