Using the Observer Effect and Cyber Feng Shui - Jacob Torrey

Using the Observer Effect and Cyber Feng Shui - Jacob Torrey

Hack In The Box Security Conference via YouTube Direct link

TLB Background

35 of 42

35 of 42

TLB Background

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Using the Observer Effect and Cyber Feng Shui - Jacob Torrey

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Questions
  3. 3 Who am I
  4. 4 Red Team
  5. 5 Three Tools
  6. 6 Trusted Computing
  7. 7 Static Measurement
  8. 8 TPMs
  9. 9 Remote attestation
  10. 10 Virtual machine introspection
  11. 11 Paranoidfish
  12. 12 CPU Isolation
  13. 13 Shared Resources
  14. 14 Cash Teller
  15. 15 rootkit
  16. 16 gadgets
  17. 17 Secure Node
  18. 18 Secure Node Demo
  19. 19 Challenges
  20. 20 VM Detection
  21. 21 Manufacturing Variants
  22. 22 Challenge
  23. 23 Puffs
  24. 24 Secret Sharing
  25. 25 Error Correction Codes
  26. 26 SRAM Example
  27. 27 Other Techniques
  28. 28 FPGAs
  29. 29 Flash
  30. 30 EEPROM
  31. 31 Row Hammer
  32. 32 Github
  33. 33 Root Trust Key
  34. 34 Zelda Theme Execution
  35. 35 TLB Background
  36. 36 Hypervisor
  37. 37 Reverse Engineering
  38. 38 Chain of Trust
  39. 39 Observer Effect
  40. 40 Conclusion
  41. 41 Future Work
  42. 42 Time Overhead

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.