Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Thunderbolt DMA attacks in this BruCON Security Conference talk. Delve into the research conducted by snare and rzn on systems with Thunderbolt ports, challenging the common perception of these attacks. Learn about the limitations and mitigations similar to FireWire DMA attacks, and understand the technical aspects of Thunderbolt, PCIe, and FPGA. Discover their approach to attacking Mac systems, potential new tricks, and gain insights into the future of Thunderbolt security vulnerabilities.
Syllabus
Intro
WHAT IS THIS TALK ABOUT?
HIT BY THE SHORT BUS
THUNDERBOLT DMA THUS FAR CHEATING WITH FIREWIRE "Thunderbolt DMA"
WHAT'S A THUNDERBOLT?
HOW IS PCIE FORMED?
WTF IS AN FPGA? [1] WIKIPEDIA
WTF IS AN FPGA? BUTT, HOW DO WE DO PCIE? AXI PCIE core uses FPGA device specific features to implement PCIE
THUNDERBOLTS ARE GO HOW DO WE TALK THUNDERBOLT
OUR APPROACH
ATTACKING A MAC OK, SO FPGA TALKS PCle OVER THUNDERBOLT NOW
BACK TO PCIE
ATTACKING A MAC STUNT HACK?!
WHAT'S NEXT? NEW TRIX
REFERENCES
Taught by
BruCON Security Conference