Analog Malicious Hardware

Analog Malicious Hardware

IEEE Symposium on Security and Privacy via YouTube Direct link

Two threats, we focus on the stage that restricts the attacker the most

5 of 12

5 of 12

Two threats, we focus on the stage that restricts the attacker the most

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Analog Malicious Hardware

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Software security success forces attackers to lower layers
  3. 3 Dynamic Static Analysis
  4. 4 Challenge: construct an attack that is stealthy and small
  5. 5 Two threats, we focus on the stage that restricts the attacker the most
  6. 6 We leverage analog behavior to construct an attack that is stealthy and small
  7. 7 An ideal analog trigger
  8. 8 Challenge: small capacitors charge quickly, large capacitors induce current spikes
  9. 9 Solution: charge sharing
  10. 10 Creating an analog trigger using gated charge sharing
  11. 11 Creating a privilege escalation attack Our analog trigger is attack agnostic
  12. 12 Implanting A2 into an existing chip layout

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.