Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how resonant frequencies can be exploited to attack hardware systems in this 46-minute Black Hat conference talk. Delve into the research of Ivan Reedman as he demonstrates how electronic sensors, programmable logic, and other devices can be subverted by targeting their resonant frequencies. Learn about the vulnerabilities in supposedly secure systems and the implications for hardware security. Examine case studies, design assumptions, and manufacturing processes that contribute to these vulnerabilities. Discover the role of software hacking, failsafe logic, and mixed signal logic in hardware attacks. Analyze voltage delta time, analog switches, and charge pumps through scope traces. Gain insights into configuration tools, privacy modes, and the theories behind these attacks. Conclude with a summary of hardware state machines and essential considerations for improving hardware security.
Syllabus
Introduction
Title
Recap
The Ware Report
A Simple Case Study
Security Comes From Process
Design With Assumptions
Software Hacking
Hardware
Failsafe Logic
Mixed Signal Logic
Manufacturing Bell Curve
Voltage Delta Time
Analog Switch
Charge Pump
Scope Trace
The Target
Configuration Tools
Frameworks Make It Easy
Privacy Mode
Demonstration
Theories
Summary
Hardware State Machines
Hardware Security
Hardware Security Summary
Taught by
Black Hat