Completed
Weak signing keys/methods
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
20 Ways Past Secure Boot
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Overview
- 3 Secure boot?
- 4 Secure boot theory
- 5 Secure boot example
- 6 ways to ...
- 7 debug access to boot stage (JTAG) riscure
- 8 Debug/service functionality
- 9 Nook boot UART exploit
- 10 18. Overriding boot source medium
- 11 TOCTOU race conditions
- 12 Timing attacks
- 13 Timing attack with Infectus board
- 14 XBOX 360 timing attack procedure
- 15 Glitch sensitivity
- 16 Glitch demo
- 17 Is it a real attack?
- 18 Slot machine EMP Jamming
- 19 Code section
- 20 EM-FI Transient Probe
- 21 Research probes
- 22 Design mistakes
- 23 Accessibility of boot ROM after boot riscure
- 24 Crypto sanitization
- 25 Firmware Upgrade / Recovery flaws riscure
- 26 Relying on unverified code
- 27 Service backdoor/password
- 28 State errors
- 29 Driver weaknesses
- 30 ROM patching functionality
- 31 Inappropriate signing area
- 32 Key management
- 33 Weak signing keys/methods
- 34 Parting thoughts