Explore the intricacies of cybersecurity and system architecture in this 50-minute conference talk from the Hack In The Box Security Conference. Delve into the observer effect in computer systems and learn how attackers can exploit architectural "tells" to detect monitoring and analysis tools. Discover techniques for remote attestation and system integrity verification. Examine the use of Physically Unclonable Functions (PUFs) for device-specific keying and system authentication. Gain insights into creating "trusted" implant networks that can evade analysis and protect sensitive data. Follow along as the speaker demonstrates practical applications of these concepts, including BIOS manipulation, hypervisor development, and CPU isolation techniques. Explore challenges in VM detection, manufacturing variants, and various PUF implementations across different hardware components. Conclude with a discussion on the implications of these techniques for cybersecurity and future research directions.
Read more
Using the Observer Effect and Cyber Feng Shui - Jacob Torrey