Главная
Study mode:
on
1
Introduction
2
Overview
3
Management
4
Forensics
5
Memory
6
Verification
7
Encryption Deployment
8
Breaking Encryption
9
TwoStory Family
10
The Scenario
11
The Real Test
12
Breakthrough
13
What is the passphrase
14
User convenience setting
15
Full disk encryption failure
16
Physical access
17
Usability vs security
18
Preboot authentication
19
Disable DMA interfaces
20
Disable standby
21
Password resets
22
Backups
23
Independent Verification
24
Conclusions
25
Questions
Description:
Explore full disk encryption vulnerabilities and defense strategies in this 53-minute conference talk from BSidesLV 2013. Delve into management, forensics, memory verification, and encryption deployment techniques. Examine real-world scenarios, including a two-story family case and breakthrough methods for breaking encryption. Learn about user convenience settings, physical access risks, and the balance between usability and security. Discover best practices for preboot authentication, disabling DMA interfaces and standby modes, password reset policies, and backup strategies. Gain insights on independent verification and engage in a Q&A session to enhance your understanding of full disk encryption security.

Attacking and Defending Full Disk Encryption

BSidesLV
Add to list