Security
Perspectives from the L0pht
For nearly a decade, Joe Grand of Grand Idea Studio was a member of the infamous hacker collective known as L0pht Heavy Industries in Boston, Massachusetts. Starting in the early 1990s as a clubhouse for local hackers to store computer equipment, tinker with projects, and just hang out, the L0pht (spelled ell-zero-ph-t) ended up as seven close-knit friends changing the face of computer security vulnerability research and disclosure. [ continue ]
Hacks and Attacks: Examples of Electronic Device Compromise
As engineers, we have a responsibility to learn from problems of the past in order to better equip ourselves for designs of the future. This session presents the typical hardware hacking process and some high-profile attacks against electronic devices such as microprocessors, smartcards, and parking meters. [ continue ]
Hardware is the New Software
Society thrives on an ever increasing use of technology. Electronics are embedded into nearly everything we touch. Hardware products are being relied on for security-related applications and are inherently trusted, though many are completely susceptible to compromise with simple classes of attacks that have been known for decades. [ continue ]
Smart Parking Meters
Throughout the United States, cities are deploying “smart” electronic fare collection infrastructures. In 2003, San Francisco launched a $35 million pilot program to replace approximately 23,000 mechanical parking meters with electronic units that boasted tamper resistance, payment via smart card, auditing capabilities, and an estimated $30 million annually in fare collection revenue. Other major cities, including Atlanta, Boston, Chicago, Los Angeles, New York, Philadelphia, Portland, and San Diego, have made similar moves. [ continue ]
RFID Security
This presentation details RFID (Radio Frequency Identification) technology and its overarching security vulnerabilities. It begins with an overview of RFID architecture, standards, and common uses and implementations. The rest of the presentation focuses on security risks and practical attacks used to compromise an RFID system. [ continue ]