Grand Idea Studio

Exploring Security Problems in Hardware Devices


Most users treat a hardware solution as an inherently trusted black box. “If it’s hardware, it must be secure,” they say. This presentation explores a number of classic, historical security problems with hardware products, including access to stored data, privilege escalation, spoofing, and man-in-the-middle attacks. Technologies commonly used in the network and computer security industries are examined, including access control, authentication tokens, and network appliances. Some of the devices mentioned in this presentation have since been updated to prevent the discussed attacks.

Slides: Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices



'Nothing's Going to Last Forever': ...


Thirty Minutes or Less: An Oral ...


'Microsoft Was Freaking Out': An ...