A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Hardware Tamper Resistance: Why and How? - Ryan Lackey Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos)

Hardware Tamper Resistance: Why and How?
Ryan Lackey
Derbycon 2014

Computer programs ultimately are executed by physical hardware- and the correct behavior of this hardware is essential to correct behavior of software. This is especially true for security tools — there are decades of hardware side channel attacks designed to subvert software security systems.In the course of developing Portal Masquerade the secure travel router- we explored a variety of hardware protection techniques for client hardware. At CryptoSeal and now at CloudFlare we’ve developed server-side hardware protection. Unfortunately a lot of documentation tools and support has been lacking in this talk- we show the state of the art in hardware protection, a simple methodology for identifying when hardware protection can be helpful and how to deploy it as well as identify promising directions for future commercial or community work.

Back to Derbycon 2014 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast