Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore hardware security vulnerabilities and implant techniques in a 43-minute Black Hat conference talk. Delve into the world of embedded, IoT, and ICS devices, examining how even software security experts often overlook hardware attacks. Discover cheap and easy methods to subvert hardware, including techniques validated by the leaked ANT catalog and NSA Playset projects. Learn about five simple hardware implants that demonstrate various attack vectors, such as privilege escalation using JTAG, kernel patching via direct memory access, wireless control of PLC inputs and outputs, hot-plugging malicious expansion modules, and system subversion through display adapters. Gain insights into potential design decisions to reduce implant vulnerabilities and ways to protect existing hardware systems from tampering. This talk by Joe FitzPatrick provides valuable knowledge for both security professionals and hardware enthusiasts interested in understanding and mitigating hardware-based threats.