Attacking Hardware Systems Using Resonance and the Laws of Physics

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=5FFWd5wTokQ



Duration: 46:12
3 views
0


Everything has a resonant frequency. By finding the resonant frequency of certain electronic sensors, programmable logic, and other devices, it is possible to subvert certain systems that are supposedly secured by the electronic components targeted in this research. From ultrasonic attacks on MEM's microphones in most voice enabled IoT and mobile equipment to high frequency electrical resonance inside certain programmable logic, these resonance attacks are all about leveraging physical properties of the target device and by chaining both these attacks and other hardware attacks together can allow software to bypass quite complex hardware security sub systems.


Presenters:
Ivan Reedman - Global Hardware Security Capability Development Lead, IBM X-Force Red
Ivan Reedman is, by nature, an innovator. He thrives on solving problems and creating solutions. He is considered by peers to be creative, unconventional, resourceful, flexible, and enthusiastic. He enjoys sharing knowledge and ideas and is always willing to learn. From building password guessing software to designing complex offensive electronic systems, if there is a challenge, he will be all over it. He understands how systems work and is able to apply the knowledge and experience to any technology. He is often asked at a very short notice to attend sales meetings with clients to discuss complex issues and is able to deliver a presentation to the client and converse at whatever level (deepest technical to commercial) in order to design a solution for the customer.
Black Hat - Europe - 2018
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-21DeepPhish Simulating Malicious AI Black Hat - Europe - 2018
2021-12-21Locknote Conclusions and Key Takeaways from Black Hat Europe 2018
2021-12-21When Machines Can't Talk Black Hat - Europe - 2018
2021-12-21Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces
2021-12-21AI Gone Rogue Exterminating Deep Fakes Before They Cause Menace
2021-12-21Where 2 Worlds Collide Bringing Mimikatz et al to UNIX
2021-12-21Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild
2021-12-21Attacking and Defending Blockchains From Horror Stories to Secure Wallets
2021-12-21Straight Outta VMware Modern Exploitation of the SVGA Device for Guest to Host Escapes
2021-12-21Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM
2021-12-21Attacking Hardware Systems Using Resonance and the Laws of Physics
2021-12-21The Last Line of Defense Understanding and Attacking Apple File System on iOS
2021-12-21Eternal War in XNU Kernel Objects Black Hat - Europe - 2018
2021-12-21Evolving Security Experts Among Teenagers Black Hat - Europe - 2018
2021-12-21No Free Charge Theorem 2 0 How to Steal Private Information from a Mobile Device Using a Powerbank
2021-12-21Off Path Attacks Against PKI Black Hat - Europe - 2018
2021-12-21How to Build Synthetic Persons in Cyberspace
2021-12-21Perception Deception Physical Adversarial Attack Challenges
2021-12-21BLEEDINGBIT Your APs Belong to Us Black Hat - Europe - 2018
2021-12-21Perfectly Deniable Steganographic Disk Encryption
2021-12-21DIFUZE Android Kernel Driver Fuzzing Black Hat - Europe - 2017



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering