ARMageddon: How Your Smartphone CPU Breaks Software-Level Security and Privacy

  Рет қаралды 33,807

Black Hat

Black Hat

Күн бұрын

Пікірлер: 17
@TheDXPower
@TheDXPower 7 жыл бұрын
All of these talks about compromising CPU security are super interesting! My favorite was the one about the hidden instructions on the x86 architecture.
@RobinObinray
@RobinObinray 5 жыл бұрын
Yeah, Chris Domas did a good job.
@SwapnilSingh4u
@SwapnilSingh4u 8 жыл бұрын
no more comments indicates that not everyone has this level of understanding thats y this is called black hats.
@pikachu5647
@pikachu5647 7 жыл бұрын
maybe intelligent people don't prefer shouting out like "yeahhh!!! i got it!"
@sleeperburuk5340
@sleeperburuk5340 8 жыл бұрын
only some people seeing this. wow
@svampebob007
@svampebob007 7 жыл бұрын
obfuscating the addresses could be an idea. The idea is that each process is handed a random key, that key is used access the "pool of registers" instead of a bank or line. basically using encryption, the hard part would be to deal with different processes depending on each others register use... you'd need a way to hand identical key to different processes when required, without allowing malicious processes to get that key (thus removing the obfuscation). It's just an idea I had just now, but it seems that if you could make address access "random" each time, yet seemingly static for the processes, it would remove a lot of cache/memory attacks. Basically a big black box of registers... it could be utterly retarded though, if so please point it out to me before I invest too much brain power on this :P
@ephraimshofar53
@ephraimshofar53 7 жыл бұрын
Anyone who has a Smart Phone is either oblivious or cares nothing about their privacy. Value Privacy? Want a Smartphone? Then live inside a Faraday Cage and never use it to make phone calls. (Because you won't be able too). Post Script Anyone who has a CELL PHONE cares nothing about their Privacy, "smart" or "not".
@RobinObinray
@RobinObinray 5 жыл бұрын
Or maybe there literally may not be any privacy at all...because there is something beyond electronics or humans..."metaphysical level of beings compromise all physical security at once"
@thepvporg
@thepvporg 6 жыл бұрын
Boring, too much explanation of things that are abstract and can be easily explained verbally in states where the attack vector happens and where it fails. Its the result that matters, the fact you did it is praise enough, however, ARM is a licence system and has many implementations, so does it work on other devices?
@RobinObinray
@RobinObinray 5 жыл бұрын
Probably yes, because most of licensed vendors don't even modify the lowest level of the architecture!
@thepvporg
@thepvporg 5 жыл бұрын
​@@RobinObinray I am not so sure of that, having watched a youtube video about ARM development by one of the guys who developed ARM. According to what he said, ARM is an architecture but not all ARM implementations are the same, they did tailor a fair number of applications to client needs, so really, the question is what sort of devices are vulnerable.
@RobinObinray
@RobinObinray 5 жыл бұрын
@@thepvporg imho, most manufacturers don't even bother changing too much of someone else's work. It's called overstandardization, and it's robotic, it's how our society is most likely going to be in the future...
@vikaskashyap4298
@vikaskashyap4298 7 жыл бұрын
sir I need your help
How Smartcard Payment Systems Fail
58:56
Black Hat
Рет қаралды 156 М.
Don't underestimate anyone
00:47
奇軒Tricking
Рет қаралды 18 МЛН
Как Я Брата ОБМАНУЛ (смешное видео, прикол, юмор, поржать)
00:59
Натурал Альбертович
Рет қаралды 4,4 МЛН
風船をキャッチしろ!🎈 Balloon catch Challenges
00:57
はじめしゃちょー(hajime)
Рет қаралды 98 МЛН
Why The US is Struggling to Return to the Moon
19:55
Real Engineering
Рет қаралды 174 М.
DRAMA: How Your DRAM Becomes a Security Problem
51:04
Black Hat
Рет қаралды 30 М.
Best 10 Items I Tested in 2024!
20:12
Project Farm
Рет қаралды 490 М.
Hacking the Wireless World with Software Defined Radio - 2.0
1:02:19
Breaking the x86 Instruction Set
44:29
Black Hat
Рет қаралды 361 М.
48 Dirty Little Secrets Cryptographers Don’t Want You To Know
50:58
The Underground Ecosystem of Credit Card Frauds
53:52
Black Hat
Рет қаралды 50 М.
Don't underestimate anyone
00:47
奇軒Tricking
Рет қаралды 18 МЛН