Fault Injection Attacks on Secure Boot

Fault Injection Attacks on Secure Boot

Hack In The Box Security Conference via YouTube Direct link

Mitigations

13 of 18

13 of 18

Mitigations

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Fault Injection Attacks on Secure Boot

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 A fault injection definition...
  3. 3 Fault injection techniques
  4. 4 Type of faults
  5. 5 Secure boot in reality
  6. 6 Why use a hardware attack?
  7. 7 Why (not) fault injection on secure boot?
  8. 8 Typical assets
  9. 9 Open source tooling
  10. 10 Commercial tooling
  11. 11 Fault injection setup
  12. 12 Hash comparison
  13. 13 Mitigations
  14. 14 Combined attack: Copy
  15. 15 Combined attack: Wild Jungle jump
  16. 16 Combined attacks - Summary
  17. 17 Attacker Practicalities
  18. 18 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.