Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
20 Ways Past Secure Boot
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Overview
- 3 Secure boot?
- 4 Secure boot theory
- 5 Secure boot example
- 6 ways to ...
- 7 debug access to boot stage (JTAG) riscure
- 8 Debug/service functionality
- 9 Nook boot UART exploit
- 10 18. Overriding boot source medium
- 11 TOCTOU race conditions
- 12 Timing attacks
- 13 Timing attack with Infectus board
- 14 XBOX 360 timing attack procedure
- 15 Glitch sensitivity
- 16 Glitch demo
- 17 Is it a real attack?
- 18 Slot machine EMP Jamming
- 19 Code section
- 20 EM-FI Transient Probe
- 21 Research probes
- 22 Design mistakes
- 23 Accessibility of boot ROM after boot riscure
- 24 Crypto sanitization
- 25 Firmware Upgrade / Recovery flaws riscure
- 26 Relying on unverified code
- 27 Service backdoor/password
- 28 State errors
- 29 Driver weaknesses
- 30 ROM patching functionality
- 31 Inappropriate signing area
- 32 Key management
- 33 Weak signing keys/methods
- 34 Parting thoughts