Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Pwning ARM Debug Components

Hack In The Box Security Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an innovative approach to ARM security in this conference talk from the Hack In The Box Security Conference. Dive into the world of ARM debug components and discover how they can be leveraged not only for information flow tracking but also for implementing various security primitives. Learn about the evolution of security vulnerabilities and the ongoing battle between security developers and attackers. Understand the importance of runtime behavior verification in computer security, with a focus on techniques like Information Flow Tracking (IFT). Examine the differences between Static Information Flow Tracking (SIFT) and Dynamic Information Flow Tracking (DIFT), and gain insights into the three key operations of DIFT: tag initialization, tag propagation, and tag checking. Presented by Muhammad Abdul Wahab, a PhD student specializing in embedded systems, software/hardware security, and FPGA reconfiguration, this 26-minute talk offers valuable knowledge for those interested in ARM security and advanced protection mechanisms.

Syllabus

#HITB2017AMS COMMSEC D2 - Pwning ARM Debug Components - Muhammad Abdul Wahab

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Pwning ARM Debug Components

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.