Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore hardware-based attack vectors in this 58-minute conference talk from nullcon Goa 2014. Delve into lesser-known aspects of computer security, focusing on hardware vulnerabilities when traditional methods prove impractical or impossible. Examine various attack techniques, including HID Vector, IR Vector, Radio, and Bus protocol attacks, with brief descriptions and demonstrations for each. Gain insights into situations where hardware-based approaches may succeed where other security measures fail. Learn about the challenges and potential of hardware security in the broader context of cybersecurity strategies.