Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Protecting Data In-Use from Firmware and Physical Attacks

Black Hat via YouTube

Overview

Explore firmware and physical attacks that compromise data in-use and system integrity in this 27-minute Black Hat conference talk. Delve into the NSA ANT program's revelations about low-cost threats to computing infrastructure outside an organization's physical control. Examine specific attacks like SMM bootkits, "cold booting," and malicious devices. Learn about existing mitigation tools and technologies, including Trusted Execution Technology (TXT) and memory encryption. Discover how upcoming technologies such as Software Guard Extensions (SGX), Enhanced Privacy ID (EPID), and TPM 2.0 can enhance protection against firmware and physical threats. Gain valuable insights from speaker Steve Weis on safeguarding your data and systems from these evolving security challenges.

Syllabus

Protecting Data In-Use from Firmware and Physical Attacks

Taught by

Black Hat

Reviews

Start your review of Protecting Data In-Use from Firmware and Physical Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.