Black Hat USA 2013 Showcases NAND, Windows 8 Secure Boot Hacking Talks

  /     /     /  
Publicated : 22/11/2024   Category : security


Black Hat USA 2013 Showcases NAND, Windows 8 Secure Boot Hacking Talks


Organizers confirm another trio of Briefings from the show



[NOTE:
Black Hat
and
Dark Reading
are both part of UBM Tech. As the key July 27th-August 1st information security event in Las Vegas approaches, well be sharing information about the show directly from its creators here on Dark Reading.]
As Julys Black Hat US in Las Vegas nears, organizers have confirmed another trio of highlighted Briefings from the show, which all focus, in some way or other, on getting under the skin of key systems. Heres the official rundown:
-- Technologies dont get much more ubiquitous than NAND memory, which is used in just about every gadget going. But ubiquity rarely equals safety, as Josh m0nk Thomas will demonstrate in
Hiding @ Depth: Exploring, Subverting, and Breaking NAND Flash Memory
. Thomas will show how NAND hardware can be subverted to hide persisting files, opening the door to everything from basic malwares to full-on device bricking. Hell release two open-source Android tools to both hide and reveal these hidden files, and explore the security implications of NANDs striking vulnerabilities. Think theres an easy fix? Unlikely. Come to the session for the full appraisal.
-- Windows 8s Secure Boot, based on UEFI 2.3.1s Secure Boot, marks a needed, long-in-coming step toward securing boot sequences against malware. But as ever, the devil is in the minute details, and it turns out that platform vendors are making certain mistakes that can completely undermine Secure Boots intended protections. Join Intels Yuriy Bulygin for
A Tale of One Software Bypass of Windows 8 Secure Boot
, in which hell demo a full software bypass of Windows 8 Secure Boot and explain how these breaches could HAve been avoided had the hardware vendors done things differently.
-- Cracking crypto is fun, but the high cost of relevant hardware can be a discouraging barrier to entry; not everyone can afford the fancy oscilloscopes used by researchers. But never fear. In
Power Analysis Attacks for Cheapskates
, Colin Flynn will show you how to create surprisingly advanced crypto-cracking systems that cost a few hundred dollars instead of a few thousand and, as a bonus, can fit in your pocket. Flynn deploys open-source technologies, from the capture board to the Python tools, so attendees will walk away with all the knowledge needed to put together their own low-cost power analysis labs.
More information about Black Hat USA 2013, which has a
rapidly growing set of Briefings talks
, as well as a
comprehensive set of two- and four-day trainings
, is available now -- and online registration, at a reduced rate from onsite,
is open
until July 24th.

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Black Hat USA 2013 Showcases NAND, Windows 8 Secure Boot Hacking Talks