Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an innovative approach to ARM security in this conference talk from the Hack In The Box Security Conference. Dive into the world of ARM debug components and discover how they can be leveraged not only for information flow tracking but also for implementing various security primitives. Learn about the evolution of security vulnerabilities and the ongoing battle between security developers and attackers. Understand the importance of runtime behavior verification in computer security, with a focus on techniques like Information Flow Tracking (IFT). Examine the differences between Static Information Flow Tracking (SIFT) and Dynamic Information Flow Tracking (DIFT), and gain insights into the three key operations of DIFT: tag initialization, tag propagation, and tag checking. Presented by Muhammad Abdul Wahab, a PhD student specializing in embedded systems, software/hardware security, and FPGA reconfiguration, this 26-minute talk offers valuable knowledge for those interested in ARM security and advanced protection mechanisms.
Syllabus
#HITB2017AMS COMMSEC D2 - Pwning ARM Debug Components - Muhammad Abdul Wahab
Taught by
Hack In The Box Security Conference