Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore fault injection techniques to bypass Secure Boot implementations in embedded systems during this 45-minute Black Hat conference talk. Delve into the challenges of exploiting early stages of Secure Boot, such as ROM or 1st stage bootloader, where logical vulnerabilities may be scarce due to their small size. Learn about alternative approaches to circumvent security measures when traditional logical exploits like SHAtter and limera1n for iPhone boot ROM are not feasible. Gain insights into advanced hardware security concepts and potential weaknesses in Secure Boot mechanisms from speakers Albert Spruyt and Niek Timmers.