Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Redesigning PKI to Solve Revocation, Expiration, and Rotation Problems

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the challenges and solutions in Public Key Infrastructure (PKI) for IoT devices in this 49-minute Black Hat conference talk. Delve into the hard-learned lessons from a former Director of Security at major tech companies, covering issues like expired keys, accidental private key exposure, and large-scale key replacements. Gain insights into the pitfalls of PKI, especially in IoT environments where consumers or site managers bear the burden of updates and fixes. Discover a redesigned approach to PKI that addresses revocation, expiration, and rotation problems. Learn about key concepts including identity, encryption, and threat models specific to IoT devices. Examine various scenarios such as fleet management, device workflows, server and application processes, breach recovery, and real-time provisioning. Get introduced to open-source solutions and see a demonstration of innovative PKI alternatives. Enhance your understanding of cybersecurity challenges in IoT and explore cutting-edge solutions to improve device security and management.

Syllabus

Intro
Background
Overview
What is TDI
IoT Hacks
CAS
IOT Devices
Threat Models
Crypto is Hard
What If
Key Terms
Identity
Intel
Encryption
PKI vs TDI
Scenarios
Fleet
Devices
Main Workflow
Server Workflow
Application Workflow
Breach Recovery
Nuclear Recovery
RealTime Provisioning
Route Validation
Open Source
NuStar
Demo
OneID
QA

Taught by

Black Hat

Reviews

Start your review of Redesigning PKI to Solve Revocation, Expiration, and Rotation Problems

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.