Attack on Titan M, Reloaded: Vulnerability Research on a Modern Security Chip
The Titan M chip was introduced by Google in their Pixel 3 devices, and in a previous study, we analyzed this chip and presented its internals and protections. Based on this acquired background, in this new talk we will focus on how we performed software vulnerability research on such a constrained target, despite the limited information available...
By: Damiano Melotti , Maxime Rossi Bellom
Full Abstract & Presentation Materials: https://www.blackhat.com/us-22/briefings/schedule/#attack-on-titan-m-reloaded-vulnerability-research-on-a-modern-security-chip-27330
Видео Attack on Titan M, Reloaded: Vulnerability Research on a Modern Security Chip канала Black Hat
By: Damiano Melotti , Maxime Rossi Bellom
Full Abstract & Presentation Materials: https://www.blackhat.com/us-22/briefings/schedule/#attack-on-titan-m-reloaded-vulnerability-research-on-a-modern-security-chip-27330
Видео Attack on Titan M, Reloaded: Vulnerability Research on a Modern Security Chip канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Hacked on National Television](https://i.ytimg.com/vi/_4GBTTP9g3U/default.jpg)
![Grand Theft House: RF Lock Pick Tool to Unlock Smart Door Lock](https://i.ytimg.com/vi/QwaoIaCON4w/default.jpg)
![Fuzzing the Native NTFS Read-Write Driver (NTFS3) in the Linux Kernel](https://i.ytimg.com/vi/n62uFd47F30/default.jpg)
![Forward Focus – The Impact of Artificial Intelligence](https://i.ytimg.com/vi/A7FxxuHV0Jk/default.jpg)
![firmWar: An Imminent Threat to the Foundation of Computing](https://i.ytimg.com/vi/io2MCK3M_pw/default.jpg)
![Fireside Chat: Jeff Moss and Gaurav Keerthi](https://i.ytimg.com/vi/ifA3kLv6D2c/default.jpg)
![Scammers Who Scam Scammers, Hackers Who Hack Hackers: Exploring a Sub-economy on Cybercrime Forums](https://i.ytimg.com/vi/5bNQnNdZeb0/default.jpg)
![Ret2page: The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache](https://i.ytimg.com/vi/HZk2egYDXxg/default.jpg)
![AEPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture](https://i.ytimg.com/vi/8ZWc7Hcsl8o/default.jpg)
![Attacks From a New Front Door in 4G & 5G Mobile Networks](https://i.ytimg.com/vi/XzvWguiFPX8/default.jpg)
![Android Universal Root: Exploiting Mobile GPU / Command Queue Drivers](https://i.ytimg.com/vi/kEl5qbLZVeY/default.jpg)
![AAD Joined Machines - The New Lateral Movement](https://i.ytimg.com/vi/ZPI2OB0g028/default.jpg)
![A Journey Into Fuzzing WebAssembly Virtual Machines](https://i.ytimg.com/vi/V3a5asx9aLQ/default.jpg)
![A New Trend for the Blue Team: Using a Symbolic Engine to Detect Evasive Forms of Malware/Ransomware](https://i.ytimg.com/vi/CIjzABWO3DY/default.jpg)
![Monitoring Surveillance Vendors: A Deep Dive into In-the-Wild Android Full Chains in 2021](https://i.ytimg.com/vi/0Vv5kLj0tz4/default.jpg)
![New Memory Forensics Techniques to Defeat Device Monitoring Malware](https://i.ytimg.com/vi/Qgu5CGV-4JY/default.jpg)
![The 8th Annual Black Hat USA NOC Report](https://i.ytimg.com/vi/ABUC7ZGB1Ok/default.jpg)
![Better Privacy Through Offense: How To Build a Privacy Red Team](https://i.ytimg.com/vi/WJXjl8vk_nM/default.jpg)
![Unlimited Results: Breaking Firmware Encryption of ESP32-V3](https://i.ytimg.com/vi/wfZHQocTsZo/default.jpg)
![Backdooring and Hijacking Azure AD Accounts by Abusing External Identities](https://i.ytimg.com/vi/uKDS2t9_KsA/default.jpg)