Grand Idea Studio

Exploring Security Problems in Hardware Devices

 

Most users treat a hardware solution as an inherently trusted black box. “If it’s hardware, it must be secure,” they say. This presentation explores a number of classic, historical security problems with hardware products, including access to stored data, privilege escalation, spoofing, and man-in-the-middle attacks. Technologies commonly used in the network and computer security industries are examined, including access control, authentication tokens, and network appliances. Some of the devices mentioned in this presentation have since been updated to prevent the discussed attacks.

Slides: Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices

Press

Supplyframe

DEF CON 27: Insecurity of Things

Ars Technica

Badge life: The story behind ...

NXP Semiconductors

Meet Joe Grand aka Kingpin, the ...