Explore Thunderspy, a series of attacks that compromise the security claims of Thunderbolt 1, 2, and 3 in this Black Hat conference talk. Delve into the vulnerabilities of Thunderbolt, a high-bandwidth interconnect used in various systems, and its susceptibility to Direct Memory Access (DMA) attacks. Examine how these attacks bypass Intel's "Security Levels" architecture and cryptographic authentication measures designed to protect against device spoofing. Learn about the implications of these security breaches for encrypted drives and system memory access. Gain insights from security researcher Björn Ruytenberg's findings on exploiting Thunderbolt's weaknesses in this 42-minute presentation.
Overview
Syllabus
When Lightning Strikes Thrice: Breaking Thunderbolt 3 Security
Taught by
Black Hat