Attacking Encrypted USB Keys the Hard(ware) Way
Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data.
By Elie Bursztein, Jean-Michel Picod & Rémi Audebert
Full Abstract & Presentation Materials:
https://www.blackhat.com/us-17/briefings.html#attacking-encrypted-usb-keys-the-hardware-way
Видео Attacking Encrypted USB Keys the Hard(ware) Way канала Black Hat
By Elie Bursztein, Jean-Michel Picod & Rémi Audebert
Full Abstract & Presentation Materials:
https://www.blackhat.com/us-17/briefings.html#attacking-encrypted-usb-keys-the-hardware-way
Видео Attacking Encrypted USB Keys the Hard(ware) Way канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
48 Dirty Little Secrets Cryptographers Don’t Want You To KnowThe Machines That Betrayed Their Masters by Glenn WilkinsonGOD MODE UNLOCKED - Hardware Backdoors in x86 CPUsIronKey Security Encryption USBHow to Encrypt a USB Flash Drive using BitLocker or VeraCryptWipe Any PC in 2 Minutes! - Redkey USBWriting Bad @$$ Malware For OS XSirenJack: Cracking a 'Secure' Emergency Warning Siren SystemUSB Drive That Steals FilesDoes dropping usb drives in parking lots and other places really work? - Blackhat USA 2016Most Secure, Private and Usable Linux DistroBypassing of Self-Encrypting Drives – Techniques for Hackers and Forensic InvestigatorsLogging In With A USB Key (U2F Explained)Black Hat Asia 2014 - The Machines That Betrayed Their MastersHow the Best Hackers Learn Their CraftEncryption and public keys | Internet 101 | Computer Science | Khan AcademyiStorage datAshur Pro2 review: The world's most secure flash drive? | By TotallydubbedHDHere is why USB Type-C is AWESOME and how you can use Power Delivery for your electronics!Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities