Главная
Study mode:
on
1
Intro
2
Questions
3
Who am I
4
Red Team
5
Three Tools
6
Trusted Computing
7
Static Measurement
8
TPMs
9
Remote attestation
10
Virtual machine introspection
11
Paranoidfish
12
CPU Isolation
13
Shared Resources
14
Cash Teller
15
rootkit
16
gadgets
17
Secure Node
18
Secure Node Demo
19
Challenges
20
VM Detection
21
Manufacturing Variants
22
Challenge
23
Puffs
24
Secret Sharing
25
Error Correction Codes
26
SRAM Example
27
Other Techniques
28
FPGAs
29
Flash
30
EEPROM
31
Row Hammer
32
Github
33
Root Trust Key
34
Zelda Theme Execution
35
TLB Background
36
Hypervisor
37
Reverse Engineering
38
Chain of Trust
39
Observer Effect
40
Conclusion
41
Future Work
42
Time Overhead
Description:
Explore the intricacies of cybersecurity and system architecture in this 50-minute conference talk from the Hack In The Box Security Conference. Delve into the observer effect in computer systems and learn how attackers can exploit architectural "tells" to detect monitoring and analysis tools. Discover techniques for remote attestation and system integrity verification. Examine the use of Physically Unclonable Functions (PUFs) for device-specific keying and system authentication. Gain insights into creating "trusted" implant networks that can evade analysis and protect sensitive data. Follow along as the speaker demonstrates practical applications of these concepts, including BIOS manipulation, hypervisor development, and CPU isolation techniques. Explore challenges in VM detection, manufacturing variants, and various PUF implementations across different hardware components. Conclude with a discussion on the implications of these techniques for cybersecurity and future research directions. Read more

Using the Observer Effect and Cyber Feng Shui - Jacob Torrey

Hack In The Box Security Conference
Add to list
00:00
-01:11