Completed
User Perspective
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Bypassing Self-Encrypting Drives in Enterprise Environments
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Daniels Background
- 3 Classical Full Disk Encryption
- 4 Advantages and Disadvantages
- 5 HardwareBased Encryption
- 6 HardwareBased Encryption Advantages
- 7 HardwareBased Encryption Overview
- 8 Opal Standard
- 9 Key Encryption
- 10 Microsoft Encrypted Drive
- 11 Custom Encrypted Drives
- 12 Open Technology
- 13 Previous Research
- 14 System Area
- 15 How Drives Work
- 16 Opel Standard
- 17 Previous Work
- 18 Demo
- 19 Miller Research
- 20 User Perspective
- 21 Forced Restart Attack
- 22 Soft Reset
- 23 Shorting Memory Pins
- 24 Triggering Crashes
- 25 Blue Screen of Death
- 26 Lenovo laptops
- 27 User options
- 28 Power cycle
- 29 Hot unplug attack
- 30 SATA extension
- 31 Key capture attack
- 32 Have I been hacked
- 33 TCG disclosure
- 34 Vulnerability notes
- 35 Impact of vulnerabilities
- 36 Questions