Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Hardware Vulnerabilities
Showing:
30
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Stanford University
Exploiting Modern Microarchitectures - Meltdown, Spectre, & Other Hardware Attacks
0
rewiews
Explore modern microarchitecture vulnerabilities like Meltdown and Spectre. Learn about hardware attacks, their mitigations, and the industry's approach to balancing performance and security.
Add to list
24
Lesons
1 hour 24 minutes
On-Demand
Free-Video
IEEE
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
0
rewiews
Comprehensive methodology for cloud providers to assess DRAM vulnerability to Rowhammer attacks, including near-optimal instruction sequences and row adjacency mapping techniques for modern Intel platforms.
Add to list
16
Lesons
17 minutes
On-Demand
Free-Video
IEEE
Blacksmith- Compromising Target Row Refresh by Rowhammering in the Frequency Domain
0
rewiews
Explore frequency-domain Rowhammer attacks bypassing Target Row Refresh, with insights on mitigations, experiments, and scalable solutions for compromising DRAM security.
Add to list
7
Lesons
19 minutes
On-Demand
Free-Video
OWASP Foundation
Exploiting Hardware Glitches and Side Channels in Perfect Software
0
rewiews
Uncover vulnerabilities in flawless software through hardware glitches and side-channel attacks. Learn advanced exploitation techniques for enhancing cybersecurity defenses.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
OWASP Foundation
Leaky Processors - Stealing Your Secrets With Foreshadow
0
rewiews
Explore the Foreshadow vulnerability in modern processors and its implications for data security. Learn about potential exploits and mitigation strategies.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
OffensiveCon
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
0
rewiews
Explore Intel microcode reverse engineering and customization techniques, uncovering CPU vulnerabilities and enhancing processor functionality.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
OffensiveCon
New Phones, Software and Chips - New Bugs?
0
rewiews
Explore cutting-edge vulnerabilities in modern smartphones, examining software and hardware innovations that introduce new security challenges.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
media.ccc.de
Reversing Robots and Bypassing Security: Hacking Vacuum and Lawn Robots
0
rewiews
Explore reverse engineering and security vulnerabilities in Ecovacs robots, uncovering potential privacy risks and methods to gain root access for custom software implementation.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
OffensiveCon
From Phantom to Inception: Leaking Data Using Branch-Free Predictor Training
0
rewiews
Explore data leakage techniques using branch-free predictor training, from phantom to inception, in modern processors.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
secwestnet
Speculative Execution Vulnerabilities: From Spectre to Control Flow Hijack
0
rewiews
Comprehensive exploration of speculative execution attacks, from original Spectre to new vulnerabilities. Clear explanations of exploitation challenges and processor vulnerabilities, with insights on high-resolution timers as potential weapons.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
TheIACR
Can We Solve Timing Side-Channels in the CPU - TASER 2021
0
rewiews
Explore timing side-channel vulnerabilities in CPUs and potential solutions with expert Ronan Lashermes from INRIA. Gain insights into this critical cybersecurity topic.
Add to list
5
Lesons
26 minutes
On-Demand
Free-Video
Linux Foundation
Spectre and Meltdown vs. Real-Time - Measuring Mitigation Costs
0
rewiews
Explore the impact of Spectre and Meltdown mitigations on real-time systems. Quantify performance costs using benchmarks, focusing on latency and determinism in embedded environments and hypervisors.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
media.ccc.de
Wallet.fail
0
rewiews
Comprehensive analysis of security vulnerabilities in popular cryptocurrency hardware wallets, demonstrating architectural, physical, and software flaws through live hacking demonstrations and detailed explanations.
Add to list
46
Lesons
1 hour 2 minutes
On-Demand
Free-Video
media.ccc.de
Internet of Dongs
0
rewiews
Explore vulnerabilities in smart sex toys, revealing privacy risks and security flaws in apps, backends, and hardware. Gain insights into the teledildonics industry's data handling practices.
Add to list
8
Lesons
33 minutes
On-Demand
Free-Video
BruCON Security Conference
A Black-Box Security Evaluation of the SpaceX Starlink User Terminal
0
rewiews
Exploración de seguridad del terminal Starlink: vulnerabilidades, ataques de inyección de fallas y acceso root. Análisis de la red Starlink y sus implicaciones para futuras investigaciones.
Add to list
30
Lesons
57 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Hardware - A Double-Edged Sword for Security
0
rewiews
Explore hardware's dual role in security: as a trust anchor and potential vulnerability. Learn about system-level threats, real-world examples, and promising solutions for detecting and preventing hardware vulnerabilities.
Add to list
16
Lesons
20 minutes
On-Demand
Free-Video
Linux Foundation
Common Attacks on IoT Devices
0
rewiews
Explore common IoT device vulnerabilities, attack strategies, and defensive measures. Learn to design secure embedded systems and stay ahead of evolving threats in the IoT landscape.
Add to list
12
Lesons
32 minutes
On-Demand
Free-Video
Linux Foundation
The Kernel Report
0
rewiews
Explore recent Linux kernel developments, hardware vulnerabilities, stable releases, and BPF technology with insights from LWN.net's Executive Editor Jonathan Corbet.
Add to list
16
Lesons
24 minutes
On-Demand
Free-Video
Black Hat
POSWorld - Should You Be Afraid of Hands-On Payment Devices
0
rewiews
Explore the vulnerabilities of Point of Sale terminals, uncovering security flaws in hardware, software, and file systems that enable cloning and fraud in the dark market.
Add to list
7
Lesons
31 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Drammer - The Making Of
0
rewiews
Exploración técnica del ataque Drammer, que aprovecha la vulnerabilidad Rowhammer en dispositivos Android sin permisos de usuario ni fallas de software. Detalla el proceso de desarrollo y los desafíos enfrentados.
Add to list
37
Lesons
57 minutes
On-Demand
Free-Video
Kaspersky
The Evolving Attack Surface
0
rewiews
Explore the expanding vulnerabilities in industrial control systems, from traditional security to blockchain, with insights on hardware attacks, supply chain risks, and network hijacking.
Add to list
20
Lesons
33 minutes
On-Demand
Free-Video
Black Hat
Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre
0
rewiews
Insider account of the urgent response to Meltdown and Spectre vulnerabilities, revealing the challenges and decisions faced by cybersecurity experts during a critical disclosure situation.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Black Hat
Can You Trust Me Now? An Exploration Into the Mobile Threat Landscape
0
rewiews
Comprehensive exploration of mobile security, examining hardware, software, and network components across platforms to uncover vulnerabilities and discuss protective measures for data and devices.
Add to list
21
Lesons
44 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Exploiting QSEE, The Raelize Way
0
rewiews
Exploiting vulnerabilities in Qualcomm's Trusted Execution Environment through software and hardware attacks, achieving arbitrary code execution and compromising device security.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
Black Hat
Learn How to Control Every Room at a Luxury Hotel Remotely
0
rewiews
Descubre cómo controlar remotamente todos los dispositivos de un hotel de lujo, explorando vulnerabilidades en sistemas de automatización y sus implicaciones para la seguridad hotelera y de los huéspedes.
Add to list
28
Lesons
21 minutes
On-Demand
Free-Video
Black Hat
Smart Nest Thermostat - A Smart Spy in Your Home
0
rewiews
Explore security vulnerabilities in Nest thermostats, including hardware-level attacks and potential for remote exploitation. Learn about risks to privacy and home security posed by compromised smart home devices.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
Torturing OpenSSL
0
rewiews
Explore hardware vulnerabilities in secure systems through a side-channel attack on RSA signatures, demonstrating how induced faults can compromise software-secure systems and extract private keys.
Add to list
19
Lesons
54 minutes
On-Demand
Free-Video
Black Hat
Hiding at Depth - Exploring, Subverting and Breaking NAND Flash Memory
0
rewiews
Explore NAND Flash vulnerabilities, learn to hide and discover files on mobile devices, and understand implications for digital forensics and device security. Open-source tools for Android demonstrated.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
linux.conf.au
The Kernel Report
0
rewiews
Comprehensive overview of Linux kernel development, covering recent updates, challenges, and future directions. Explores hardware vulnerabilities, stable kernels, testing initiatives, and mobile Linux progress.
Add to list
21
Lesons
46 minutes
On-Demand
Free-Video
USENIX
Basilisk: Remote Code Execution by Laser Excitation of P-N Junctions Without Insider Assistance
0
rewiews
Discover how laser-based attacks can manipulate P-N junctions to achieve remote code execution and system interference, exploring practical demonstrations and potential countermeasures for hardware security.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
load more...