Fault Injection Attacks on Secure Boot

Fault Injection Attacks on Secure Boot

Hack In The Box Security Conference via YouTube Direct link

Intro

1 of 18

1 of 18

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Fault Injection Attacks on Secure Boot

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 A fault injection definition...
  3. 3 Fault injection techniques
  4. 4 Type of faults
  5. 5 Secure boot in reality
  6. 6 Why use a hardware attack?
  7. 7 Why (not) fault injection on secure boot?
  8. 8 Typical assets
  9. 9 Open source tooling
  10. 10 Commercial tooling
  11. 11 Fault injection setup
  12. 12 Hash comparison
  13. 13 Mitigations
  14. 14 Combined attack: Copy
  15. 15 Combined attack: Wild Jungle jump
  16. 16 Combined attacks - Summary
  17. 17 Attacker Practicalities
  18. 18 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.