Главная
Study mode:
on
1
Intro
2
Background
3
Overview
4
What is TDI
5
IoT Hacks
6
CAS
7
IOT Devices
8
Threat Models
9
Crypto is Hard
10
What If
11
Key Terms
12
Identity
13
Intel
14
Encryption
15
PKI vs TDI
16
Scenarios
17
Fleet
18
Devices
19
Main Workflow
20
Server Workflow
21
Application Workflow
22
Breach Recovery
23
Nuclear Recovery
24
RealTime Provisioning
25
Route Validation
26
Open Source
27
NuStar
28
Demo
29
OneID
30
QA
Description:
Explore the challenges and solutions in Public Key Infrastructure (PKI) for IoT devices in this 49-minute Black Hat conference talk. Delve into the hard-learned lessons from a former Director of Security at major tech companies, covering issues like expired keys, accidental private key exposure, and large-scale key replacements. Gain insights into the pitfalls of PKI, especially in IoT environments where consumers or site managers bear the burden of updates and fixes. Discover a redesigned approach to PKI that addresses revocation, expiration, and rotation problems. Learn about key concepts including identity, encryption, and threat models specific to IoT devices. Examine various scenarios such as fleet management, device workflows, server and application processes, breach recovery, and real-time provisioning. Get introduced to open-source solutions and see a demonstration of innovative PKI alternatives. Enhance your understanding of cybersecurity challenges in IoT and explore cutting-edge solutions to improve device security and management. Read more

Redesigning PKI to Solve Revocation, Expiration, and Rotation Problems

Black Hat
Add to list