Exploring Security Problems in Hardware Devices
Most users treat a hardware solution as an inherently trusted black box. “If it’s hardware, it must be secure,” they say. This presentation explores a number of classic, historical security problems with hardware products, including access to stored data, privilege escalation, spoofing, and man-in-the-middle attacks. Technologies commonly used in the network and computer security industries are examined, including access control, authentication tokens, and network appliances. Some of the devices mentioned in this presentation have since been updated to prevent the discussed attacks.
Slides: Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices