Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Secure Boot
YouTube
education
Showing:
79
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Linux Foundation
Project Cerberus: Hardware Root of Trust for Cloud Security
0
rewiews
Explore hardware-enforced secure boot and measured boot with Project Cerberus, a cryptographic microcontroller enhancing firmware security for cloud platforms and data centers.
Add to list
20
Lesons
35 minutes
On-Demand
Free-Video
Linux Foundation
Secure Boot from A to Z - Building a Complete Chain-of-Trust
0
rewiews
Comprehensive guide to implementing Secure Boot on embedded systems, covering encryption, signatures, bootloaders, and filesystem security with practical examples and real-world applications.
Add to list
22
Lesons
49 minutes
On-Demand
Free-Video
Linux Foundation
Zephyr and Trusted Execution Environments for Microcontrollers
0
rewiews
Explore Zephyr's implementation of trusted execution environments for ARM microcontrollers, covering hardware requirements, security configurations, and multi-core support.
Add to list
12
Lesons
27 minutes
On-Demand
Free-Video
Linux Foundation
Protected Execution Facility: Enhancing Security for Virtual Machines
0
rewiews
Explore IBM's Protected Execution Facility for enhanced security in cloud computing. Learn about secure virtual machines, architecture modifications, and safeguards against compromised components in Power Architecture servers.
Add to list
21
Lesons
41 minutes
On-Demand
Free-Video
Linux Foundation
Implementing UEFI-based Secure Boot and OTA Updates for Embedded ARM Devices
0
rewiews
Explore secure boot implementation and OTA updates for embedded ARM devices using UEFI, covering challenges, solutions, and practical integration techniques for robust system security.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Linux Foundation
Implementing Secure Boot and Disk Encryption on Tegra Platforms
0
rewiews
Secure boot and disk encryption implementation on Tegra platforms: lessons learned, challenges faced, and solutions developed for a robust and future-proof system using vendor tools and custom OS builds.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Linux Foundation
From a Security Expert's Diary: DOs and DON'Ts When Choosing Software for Embedded Products
0
rewiews
Practical advice on selecting software for embedded products, covering distribution choices, module selection, support assessment, update systems, and security considerations.
Add to list
9
Lesons
39 minutes
On-Demand
Free-Video
Linux Foundation
Will it Boot? The Case for Platform Standards in Embedded Systems
0
rewiews
Explore embedded Linux ecosystems, UEFI, and platform standards for bootable systems. Learn about architecture, security, and certification in embedded development.
Add to list
19
Lesons
41 minutes
On-Demand
Free-Video
Linux Foundation
Secure Bootloaders and Secure Software Update Support in CIP - Civil Infrastructure Platform
0
rewiews
Explore secure bootloaders and software updates in CIP, focusing on implementation, IEC-62443 compliance, and the collaborative efforts of CIP workgroups to enhance industrial software security.
Add to list
27
Lesons
39 minutes
On-Demand
Free-Video
Linux Foundation
Dynamic Key Managed PowerPC Guest Secure Boot
0
rewiews
Learn about dynamic key secure boot for Power LPARs, addressing static key limitations and exploring new mechanisms for enhanced boot-level security on PowerPC systems.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Linux Foundation
Secure Boot - What Is It and Do I Need It?
0
rewiews
Explore secure boot in IoT: its components, use cases, threats it prevents, and implementation status. Learn key elements for supporting secure boot in connected devices.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Linux Foundation
Design and Implementation of a Security Architecture for Critical Infrastructure Industrial Control Systems
0
rewiews
Comprehensive security architecture for critical infrastructure, addressing nation-state cyber threats. Covers hardware roots of trust, secure boot, and integrity measures across various systems and networks.
Add to list
12
Lesons
40 minutes
On-Demand
Free-Video
Linux Foundation
Boot to Cloud Security Considerations for IoT Systems
0
rewiews
Comprehensive guide to designing secure IoT systems, covering boot processes, data flow, authentication, and cloud connectivity. Offers best practices for embedded developers using open-source software and standards.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
Linux Foundation
Maintaining a Community BSP Layer: Updating Meta-Tegra Through Major Changes
0
rewiews
Explore strategies for maintaining the meta-tegra BSP layer amid major SDK and OpenEmbedded changes, covering bootloader updates, trusted OS transitions, and support for future Jetson platforms.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
Linux Foundation
Securing TPM Secrets with TXT and Kernel Signatures
0
rewiews
Explore securing TPM2 NVRAM data using Intel TXT and tboot extensions for kernel signature verification, enhancing protection while maintaining usability during kernel updates.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Linux Foundation
Secure Boot and Over-the-Air Updates - Challenges and Solutions
0
rewiews
Explore secure boot and over-the-air update challenges in embedded systems, focusing on implementation complexities and best practices for robust, tamper-resistant solutions.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
nullcon
Breaking RSA Authentication and Bitstream Recovery From Zynq-7000 SoC
0
rewiews
Uncovers critical vulnerability in Zynq-7000 SoC's secure boot, allowing RSA authentication bypass. Explores implications for embedded device security and trusted computing.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Low Level Learning
Secure Boot Vulnerabilities and Private Key Leaks - Implications and Solutions
0
rewiews
Explore recent security breaches, their implications, and learn how to protect yourself online using two-factor authentication and tools like YubiKey.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
OffensiveCon
Booting with Caution: Dissecting Secure Boot's Third-Party Attack Surface
0
rewiews
Dissect Secure Boot's third-party attack surface, exploring vulnerabilities and potential exploits in boot processes.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
RIOT
Is Remote Attestation Relevant for Embedded Devices? - RIOT Summit 2024
0
rewiews
Explore remote attestation's relevance for embedded devices, examining latest developments, challenges, and potential benefits in the context of Trusted Execution Environments and RIOT OS.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
Linux Foundation
The Cyber Resilience Act: Navigating Its Impact on Yocto-Based Products
0
rewiews
Explore the Cyber Resilience Act's impact on Yocto-based products, covering key provisions, security compliance, challenges, and best practices for building secure embedded systems.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Yocto Project
Yocto on the Edge - Unusual Challenges for Intel-Based Systems - Lecture 8
0
rewiews
Explore challenges and solutions for Yocto-based edge computing systems on Intel platforms, covering provisioning, secure user management, and A/B updates with secure boot.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Linux Foundation
Providing Confidential Guest Services with a Secure VM Service Module on AMD
0
rewiews
Explore AMD's SEV-SNP architecture, VMPL, and SVSM for enhanced guest security in virtualization. Learn about Linux kernel support and open-source SVSM development for secure boot and live migration.
Add to list
14
Lesons
28 minutes
On-Demand
Free-Video
Linux Foundation
Verifiable End-to-End Secure OCI Native Machines
0
rewiews
Explore a secure toolchain for verifiable workloads using signed OCI images, ensuring tamper-proof boot processes and authenticated communication with hosts.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Linux Foundation
PowerVM Platform Keystore - Securing Linux Credentials Locally
0
rewiews
Explore PowerVM's Platform Keystore for secure Linux credential storage, focusing on boot-time security, kernel interfaces, and challenges in developing unified interfaces for diverse platforms.
Add to list
12
Lesons
27 minutes
On-Demand
Free-Video
Linux Foundation
DIGLIM eBPF - Secure Boot at Application Level with Minimal Distro Changes
0
rewiews
Explore secure boot implementation at the application level using eBPF technology, minimizing distro modifications for enhanced system integrity and security.
Add to list
1
Lesons
1 hour 21 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
KMM - Your Swiss Army Knife for Kernel Modules on Kubernetes
0
rewiews
Explore KMM for efficient kernel module management in Kubernetes. Learn to build, load, and upgrade modules, enabling AI/ML, edge computing, and software-defined storage solutions at scale.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Linux Foundation
Creating a Secure IoT Platform Using Common Linux Distributions
0
rewiews
Explore creating a secure IoT platform using Fedora, focusing on maintenance, updates, and security measures for robust edge-to-cloud solutions and large-scale device management.
Add to list
7
Lesons
24 minutes
On-Demand
Free-Video
Linux Foundation
Apache Mynewt Bootloader for Reliable and Secure Firmware Upgrades
0
rewiews
Learn about Apache Mynewt's open-source bootloader for MCUs, covering design, fail-safe mechanisms, security features, and implementation across architectures. Gain insights into reliable firmware upgrades.
Add to list
10
Lesons
42 minutes
On-Demand
Free-Video
Linux Foundation
TrenchBoot: Enhancing System Security with Intel TXT and AMD SVM
0
rewiews
Explore TrenchBoot's integration of hardware-rooted security for open and proprietary systems, reducing attack surfaces and enhancing platform integrity through Intel TXT and AMD SVM technologies.
Add to list
20
Lesons
37 minutes
On-Demand
Free-Video
Linux Foundation
Protecting Your System from Security Threats - Linux Security Mechanisms
0
rewiews
Comprehensive overview of Linux security mechanisms for embedded systems, covering encryption, secure boot, and integrity measures to protect against various attacks.
Add to list
24
Lesons
41 minutes
On-Demand
Free-Video
Linux Foundation
Enhancing System Security by Integrating Zephyr Bootloader and MCUboot
0
rewiews
Learn to enhance system security by integrating Zephyr Bootloader and MCUboot. Explore implementation techniques, benefits, and best practices for secure firmware development in embedded systems.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Linux Foundation
Using Linux as a Secure Boot Loader for OpenPOWER Servers
0
rewiews
Explore enhancements to Linux's Integrity Management Architecture for secure boot loading on OpenPOWER servers, addressing limitations and providing flexible run-time decision-making capabilities.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Linux Foundation
OpenPOWER Host OS Secure Boot Key Management
0
rewiews
Explore OpenPOWER's flexible key management for Linux-based secure boot, covering architecture, ownership, updates, storage, and compatibility across firmware, kernel, and userspace.
Add to list
21
Lesons
33 minutes
On-Demand
Free-Video
Linux Foundation
Fort Kairos - A New Dawn for Secure Linux in Untrusted Environments
0
rewiews
Explore Fort Kairos, an open-source project revolutionizing secure Linux for untrusted edge environments using Trusted Boot, TPM, and disk encryption.
Add to list
1
Lesons
10 minutes
On-Demand
Free-Video
media.ccc.de
The One Weird Trick SecureROM Hates
0
rewiews
Explore the unfixable Checkm8 vulnerability in iPhones' SecureROM, its exploitation for jailbreaking, and implications for iOS security research and device control.
Add to list
14
Lesons
39 minutes
On-Demand
Free-Video
WEareTROOPERS
20 Ways Past Secure Boot
0
rewiews
Explore 20 methods to bypass secure boot, including debug access, exploits, timing attacks, glitches, and design flaws. Learn about real-world examples and security implications.
Add to list
34
Lesons
52 minutes
On-Demand
Free-Video
Linux Foundation
Using the TPM NVRAM to Protect Secure Boot Keys in POWER9 OpenPOWER Systems
0
rewiews
Explore TPM NVRAM's role in safeguarding secure boot keys for POWER9 OpenPOWER systems, covering design and implementation aspects in firmware and Linux kernel layers.
Add to list
20
Lesons
41 minutes
On-Demand
Free-Video
Linux Foundation
Device Security in IoT
0
rewiews
Explore IoT device security principles, challenges, and solutions using Trusted Firmware for M and Platform Security Architecture. Learn about secure boot, communication, and compartmentalization.
Add to list
13
Lesons
43 minutes
On-Demand
Free-Video
Linux Foundation
Open Source CVE Monitoring and Management - Cutting Through the Vulnerability Storm
0
rewiews
Learn to monitor, assess, and address open source vulnerabilities effectively. Explore challenges in CVE tracking, improve accuracy, and enhance device security through practical techniques and community-driven solutions.
Add to list
23
Lesons
40 minutes
On-Demand
Free-Video
Linux Foundation
Booting Automotive ECUs Really Fast with Modern Security Features
0
rewiews
Explore fast booting techniques for automotive ECUs with modern security features, focusing on BMW's approach to meeting strict performance requirements in various vehicle domains.
Add to list
14
Lesons
42 minutes
On-Demand
Free-Video
Black Hat
Fatal Fury on ESP32 - Time to Release Hardware Exploits
0
rewiews
Methodical exploration of defeating ESP32 security features using low-cost hardware techniques, including voltage glitching and analog side-channels, with implications for IoT device security.
Add to list
15
Lesons
48 minutes
On-Demand
Free-Video
Black Hat
Exploiting Qualcomm WLAN and Modem Over The Air
0
rewiews
Explore Qualcomm WLAN and Modem vulnerabilities, focusing on firmware exploitation, isolation breaches, and over-the-air control techniques. Gain insights into real-time debugging and mitigation strategies.
Add to list
33
Lesons
45 minutes
On-Demand
Free-Video
Black Hat
Kernel Mode Threats and Practical Defenses
0
rewiews
Explore advanced kernel mode threats, Microsoft's defenses, and practical strategies for detecting and mitigating sophisticated attacks on Windows operating systems.
Add to list
30
Lesons
47 minutes
On-Demand
Free-Video
Black Hat
Behind the Scenes of iOS and Mac Security
0
rewiews
Explore iOS and macOS security features, including Find My, Gatekeeper, and kernel integrity protection. Learn about Apple's innovative approaches to user privacy and device security.
Add to list
31
Lesons
44 minutes
On-Demand
Free-Video
nullcon
The One Weird Trick SecureROM Hates - Vol. 2
0
rewiews
Exploring checkm8 vulnerability in iOS SecureROM, its exploitation for jailbreaking, and updates on pongoOS development. Insights into cross-platform challenges and future plans for iOS security research.
Add to list
17
Lesons
1 hour 5 minutes
On-Demand
Free-Video
nullcon
I Boot when U-Boot
0
rewiews
Explore a custom bootkit for U-Boot devices, its persistence techniques, and implications for IoT security. Learn about backdooring methods and potential countermeasures.
Add to list
22
Lesons
33 minutes
On-Demand
Free-Video
USENIX
Give Your PXE Wings - Bootstrapping Explained
0
rewiews
Demystifying system bootstrapping: explore PXE, multi-stage processes, and automation techniques for faster, simpler, and more reliable IT provisioning and day-two operations.
Add to list
14
Lesons
39 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Fault Injection Attacks on Secure Boot
0
rewiews
Exploring fault injection attacks on secure boot, this talk introduces techniques, impacts, and practical mitigation strategies for embedded systems security, with real-world examples and key takeaways.
Add to list
18
Lesons
27 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
TOCTOU Attacks Against Secure Boot and BootGuard
0
rewiews
Explore TOCTOU attacks on Intel's BootGuard, learn about vulnerabilities in secure boot processes, and discover open-source tools for testing system security.
Add to list
20
Lesons
39 minutes
On-Demand
Free-Video
Black Hat
Forging the USB Armory
0
rewiews
Explore the development of an open-source USB-sized computer for security applications, featuring advanced SoC technology, secure boot, and ARM TrustZone implementation.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
media.ccc.de
Linux Secure Boot
0
rewiews
Erfahrungen und Konzepte zur Implementierung von Secure Boot auf Linux-Systemen, um Schadsoftware und manipulierte Betriebssysteme zu verhindern.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
BSidesLV
Rethink, Repurpose, Reuse - Rain Hell
0
rewiews
Explore innovative ways to repurpose and reuse technology, focusing on Android devices and Linux installations on various platforms. Learn about security implications and future possibilities.
Add to list
22
Lesons
38 minutes
On-Demand
Free-Video
Black Hat
Bypassing Secure Boot Using Fault Injection
0
rewiews
Explore fault injection techniques to bypass Secure Boot in embedded systems, focusing on hardware-based attacks when logical vulnerabilities are absent.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Black Hat
Bypassing the Maginot Line - Remotely Exploit the Hardware Decoder on Smartphone
0
rewiews
Explore vulnerabilities in Qualcomm's Venus hardware decoder, learn its architecture, and discover remote exploitation techniques for smartphone security research.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Black Hat
Secure Boot Under Attack - Simulation to Enhance Fault Attacks & Defenses
0
rewiews
Explore fault injection attacks on Secure Boot, their impact on embedded systems, and strategies for enhancing defenses through simulation techniques.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Black Hat
Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot
0
rewiews
Exploración de vulnerabilidades en el arranque seguro de Samsung S10, analizando el manejo de solicitudes USB en S-Boot y sus implicaciones para la seguridad del dispositivo.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
44CON Information Security Conference
Forging the USB Armory
0
rewiews
Explore the development of the USB armory, an open-source hardware device for security applications. Learn about its architecture, security features, and potential uses as a trusted USB device.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
linux.conf.au
Securing Firmware - Secure and Trusted Boot in OpenBMC
0
rewiews
Explore secure and trusted boot in OpenBMC, covering hardware root of trust, TPMs, keys, and signing while preserving user freedom to replace firmware securely.
Add to list
11
Lesons
39 minutes
On-Demand
Free-Video
linux.conf.au
Becoming a Tyrant - Implementing Secure Boot in Embedded Devices
0
rewiews
Explore secure boot implementation in embedded devices, covering mechanisms, reasons, experiences, and considerations. Learn about chain of trust, adversaries, and implications for device modification and security.
Add to list
24
Lesons
42 minutes
On-Demand
Free-Video
code::dive conference
What Does It Mean to Trust Your Boot Process
0
rewiews
Explore boot processes, secure boot, and trust establishment in x86 and ARM architectures. Learn about firmware, TPM, and measured boot to enhance device security from startup.
Add to list
13
Lesons
51 minutes
On-Demand
Free-Video
CppNow
If You Can't Open It, You Don't Own It
0
rewiews
Exploring hardware vulnerabilities and their impact on C++ systems, this talk delves into side-channel attacks, physical penetrations, and supply chain risks, offering insights for securing modern C++ designs.
Add to list
35
Lesons
1 hour 23 minutes
On-Demand
Free-Video
Linux Plumbers Conference
Hardening the Kernel for Secure Boot
0
rewiews
Explore kernel hardening techniques for Secure Boot, focusing on preventing privileged code execution and securing kernel entry points to maintain a trusted boot process.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Linux Plumbers Conference
System Boot and Security MC
0
rewiews
Explore cutting-edge developments in Linux system boot processes and security measures at this comprehensive conference session, featuring expert discussions and insights.
Add to list
1
Lesons
4 hours 39 minutes
On-Demand
Free-Video
Linux Plumbers Conference
Secure Boot Auto Enrollment
0
rewiews
Explore Secure Boot auto enrollment with Vincent Dagonneau, covering implementation, challenges, and future developments in Linux system security.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Tech Field Day
VMware Cloud Foundation's Approach to Platform Security - Making Complex Security Tasks Simple
0
rewiews
Discover how VMware Cloud Foundation simplifies complex security tasks through features like ESXi Live Patch, Identity Federation, and automated audit tools while maintaining robust platform protection.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Open Compute Project
Secure System Design on ARM Using PA-RoT
0
rewiews
Explore secure system architecture implementation using PA-RoT technology on ARM platforms, focusing on robust hardware-based security measures and trusted computing principles.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Open Compute Project
OpenTitan: Open-Source Hardware Root of Trust - Project Update
0
rewiews
Discover the latest developments in OpenTitan's open-source hardware root of trust, including its architecture, security features, and applications for firmware protection and secret storage.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Linux Foundation
TBOOT and Secure Boot Coexistence for Enhanced OS Launch Security
0
rewiews
Explore advanced OS security through TBOOT and Secure Boot coexistence, enhancing system protection and launch integrity for a more robust computing environment.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Linux Foundation
OP-TEE is Ready - Let's Use It
0
rewiews
Explore OP-TEE's capabilities and practical applications in secure embedded systems with expert guidance from Pengutronix e.K.'s Rouven Czerwinski.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Linux Foundation
Securing TPM Secrets with TXT and Kernel Signatures
0
rewiews
Explore securing TPM2 NVRAM data using Intel TXT and tboot extensions for kernel signature verification, enhancing protection while maintaining usability during kernel updates.
Add to list
16
Lesons
33 minutes
On-Demand
Free-Video
DEFCONConference
Windows Downdate: Downgrade Attacks Using Windows Updates
0
rewiews
Discover how to exploit Windows Update vulnerabilities to craft downgrade attacks, bypass security features, and compromise system integrity - from kernel to virtualization stack.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
KVM Forum
Coconut-SVSM - Early Attestation to Unlock Persistent State - KVM Forum
0
rewiews
Explore early attestation for unlocking persistent state in Coconut-SVSM, enabling stateful services like vTPM and secure UEFI variable store for Confidential VM guests on AMD SEV-SNP platforms.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
SNIAVideo
Building Robust Data-Centric Security with Advanced Block Storage Systems
0
rewiews
Explore comprehensive data security strategies for enterprise block storage systems, covering authentication protocols, confidentiality measures, and protection against modern threats like ransomware.
Add to list
19
Lesons
1 hour 4 minutes
On-Demand
Free-Video
Linux Foundation
Secure and Encrypted Boot in Zephyr RTOS Using Hardware Keys and TrustZone
0
rewiews
Explore secure booting implementation in Zephyr RTOS using MCUboot, hardware keys, and encryption features like HAB and TF-M for enhanced embedded system security and tamper protection.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
NANOG
Demystifying the Quantum Threat for Network Operators
0
rewiews
Explore quantum computing's impact on network security, understanding quantum-resistant encryption methods and implementing practical solutions to protect networks from emerging quantum threats.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
BSidesMunich
From Boot to Root: Identifying and Mitigating Security Issues in Bootloaders
0
rewiews
Dive into bootloader security vulnerabilities and learn effective mitigation strategies for protecting systems during the critical boot process.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
USENIX
Breaking Espressif's ESP32 V3: Program Counter Control with Computed Values Using Fault Injection
0
rewiews
Discover how researchers bypassed ESP32 V3's security features through fault injection attacks, exposing vulnerabilities in Secure Boot and Flash Encryption systems with electromagnetic glitching techniques.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
USENIX
Achilles Heel in Secure Boot: Breaking RSA Authentication and Bitstream Recovery from Zynq-7000 SoC
0
rewiews
Uncover critical security vulnerabilities in Zynq-7000 SoC's secure boot implementation, exploring RSA authentication bypass and practical 'Starbleed' attacks for bitstream recovery.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
load more...