Главная
Study mode:
on
1
Introduction
2
Title
3
Recap
4
The Ware Report
5
A Simple Case Study
6
Security Comes From Process
7
Design With Assumptions
8
Software Hacking
9
Hardware
10
Failsafe Logic
11
Mixed Signal Logic
12
Manufacturing Bell Curve
13
Voltage Delta Time
14
Analog Switch
15
Charge Pump
16
Scope Trace
17
The Target
18
Configuration Tools
19
Frameworks Make It Easy
20
Privacy Mode
21
Demonstration
22
Theories
23
Summary
24
Hardware State Machines
25
Hardware Security
26
Hardware Security Summary
Description:
Explore how resonant frequencies can be exploited to attack hardware systems in this 46-minute Black Hat conference talk. Delve into the research of Ivan Reedman as he demonstrates how electronic sensors, programmable logic, and other devices can be subverted by targeting their resonant frequencies. Learn about the vulnerabilities in supposedly secure systems and the implications for hardware security. Examine case studies, design assumptions, and manufacturing processes that contribute to these vulnerabilities. Discover the role of software hacking, failsafe logic, and mixed signal logic in hardware attacks. Analyze voltage delta time, analog switches, and charge pumps through scope traces. Gain insights into configuration tools, privacy modes, and the theories behind these attacks. Conclude with a summary of hardware state machines and essential considerations for improving hardware security.

Attacking Hardware Systems Using Resonance and the Laws of Physics

Black Hat
Add to list
0:00 / 0:00