Grand Idea Studio

Exploring Security Problems in Hardware Devices

 

Most users treat a hardware solution as an inherently trusted black box. “If it’s hardware, it must be secure,” they say. This presentation explores a number of classic, historical security problems with hardware products, including access to stored data, privilege escalation, spoofing, and man-in-the-middle attacks. Technologies commonly used in the network and computer security industries are examined, including access control, authentication tokens, and network appliances. Some of the devices mentioned in this presentation have since been updated to prevent the discussed attacks.

Slides: Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices

Press

Pentester Academy TV

Hardware Security Training

PCMag

Joe 'Kingpin' Grand on Hacker ...

Uses This

Joe Grand