Completed
Why use a hardware attack?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Fault Injection Attacks on Secure Boot
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 A fault injection definition...
- 3 Fault injection techniques
- 4 Type of faults
- 5 Secure boot in reality
- 6 Why use a hardware attack?
- 7 Why (not) fault injection on secure boot?
- 8 Typical assets
- 9 Open source tooling
- 10 Commercial tooling
- 11 Fault injection setup
- 12 Hash comparison
- 13 Mitigations
- 14 Combined attack: Copy
- 15 Combined attack: Wild Jungle jump
- 16 Combined attacks - Summary
- 17 Attacker Practicalities
- 18 Conclusion