Grand Idea Studio

Exploring Security Problems in Hardware Devices

 

Most users treat a hardware solution as an inherently trusted black box. “If it’s hardware, it must be secure,” they say. This presentation explores a number of classic, historical security problems with hardware products, including access to stored data, privilege escalation, spoofing, and man-in-the-middle attacks. Technologies commonly used in the network and computer security industries are examined, including access control, authentication tokens, and network appliances. Some of the devices mentioned in this presentation have since been updated to prevent the discussed attacks.

Slides: Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices

Press

The Virtual CISO Podcast

How Hardware Hackers Exploit IoT ...

OnTrack: The PCB Design Podcast

Design Your Electronic Device with ...

Cool Tools

Joe Grand