Using the Observer Effect and Cyber Feng Shui - Jacob Torrey
Hack In The Box Security Conference via YouTube
Overview
Syllabus
Intro
Questions
Who am I
Red Team
Three Tools
Trusted Computing
Static Measurement
TPMs
Remote attestation
Virtual machine introspection
Paranoidfish
CPU Isolation
Shared Resources
Cash Teller
rootkit
gadgets
Secure Node
Secure Node Demo
Challenges
VM Detection
Manufacturing Variants
Challenge
Puffs
Secret Sharing
Error Correction Codes
SRAM Example
Other Techniques
FPGAs
Flash
EEPROM
Row Hammer
Github
Root Trust Key
Zelda Theme Execution
TLB Background
Hypervisor
Reverse Engineering
Chain of Trust
Observer Effect
Conclusion
Future Work
Time Overhead
Taught by
Hack In The Box Security Conference