Explore hardware-based attack vectors in this 58-minute conference talk from nullcon Goa 2014. Delve into lesser-known aspects of computer security, focusing on hardware vulnerabilities when traditional methods prove impractical or impossible. Examine various attack techniques, including HID Vector, IR Vector, Radio, and Bus protocol attacks, with brief descriptions and demonstrations for each. Gain insights into situations where hardware-based approaches may succeed where other security measures fail. Learn about the challenges and potential of hardware security in the broader context of cybersecurity strategies.
Overview
Syllabus
nullcon Goa 2014: Hardware Attack Vectors by @YashinMehaboobe
Taught by
nullcon