際際滷shows by User: JustinBlack7 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: JustinBlack7 / Thu, 22 Nov 2018 15:33:54 GMT 際際滷Share feed for 際際滷shows by User: JustinBlack7 Who needs iot security? /slideshow/who-needs-iot-security/123721965 whoneedsiotsecurity-181122153354
Today connected devices are everywhere, where we expect a massive growth over the upcoming years. What are connected devices (IOT)? It connects people to machines, machines to machines and shares data both people and machines create. However, why should you care about security? This presentation walks you through why connected devices (IOT) are being targeted, what typically goes wrong during development making these devices vulnerable to attacks and whats next... ]]>

Today connected devices are everywhere, where we expect a massive growth over the upcoming years. What are connected devices (IOT)? It connects people to machines, machines to machines and shares data both people and machines create. However, why should you care about security? This presentation walks you through why connected devices (IOT) are being targeted, what typically goes wrong during development making these devices vulnerable to attacks and whats next... ]]>
Thu, 22 Nov 2018 15:33:54 GMT /slideshow/who-needs-iot-security/123721965 JustinBlack7@slideshare.net(JustinBlack7) Who needs iot security? JustinBlack7 Today connected devices are everywhere, where we expect a massive growth over the upcoming years. What are connected devices (IOT)? It connects people to machines, machines to machines and shares data both people and machines create. However, why should you care about security? This presentation walks you through why connected devices (IOT) are being targeted, what typically goes wrong during development making these devices vulnerable to attacks and whats next... <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whoneedsiotsecurity-181122153354-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Today connected devices are everywhere, where we expect a massive growth over the upcoming years. What are connected devices (IOT)? It connects people to machines, machines to machines and shares data both people and machines create. However, why should you care about security? This presentation walks you through why connected devices (IOT) are being targeted, what typically goes wrong during development making these devices vulnerable to attacks and whats next...
Who needs iot security? from Justin Black
]]>
354 3 https://cdn.slidesharecdn.com/ss_thumbnails/whoneedsiotsecurity-181122153354-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Using fault injection attacks for digital forensics /slideshow/using-fault-injection-attacks-for-digital-forensics/123720468 faultinjectionforforensicsv3-181122151823
Forensics is an important incident response and law enforcement tool. However, more and more devices have started using hardware encryption to ensure that the secrets they contain are well protected. Fault injection is a technique by which injecting various types of faults into an embedded system causes it to perform in a way it wouldn't have otherwise. In this presentation, we show how we can utilize fault injection techniques to perform forensics on an encrypted device. This presentation shows how fault injection works and what it can be used for digital forensics needs. ]]>

Forensics is an important incident response and law enforcement tool. However, more and more devices have started using hardware encryption to ensure that the secrets they contain are well protected. Fault injection is a technique by which injecting various types of faults into an embedded system causes it to perform in a way it wouldn't have otherwise. In this presentation, we show how we can utilize fault injection techniques to perform forensics on an encrypted device. This presentation shows how fault injection works and what it can be used for digital forensics needs. ]]>
Thu, 22 Nov 2018 15:18:23 GMT /slideshow/using-fault-injection-attacks-for-digital-forensics/123720468 JustinBlack7@slideshare.net(JustinBlack7) Using fault injection attacks for digital forensics JustinBlack7 Forensics is an important incident response and law enforcement tool. However, more and more devices have started using hardware encryption to ensure that the secrets they contain are well protected. Fault injection is a technique by which injecting various types of faults into an embedded system causes it to perform in a way it wouldn't have otherwise. In this presentation, we show how we can utilize fault injection techniques to perform forensics on an encrypted device. This presentation shows how fault injection works and what it can be used for digital forensics needs. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/faultinjectionforforensicsv3-181122151823-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Forensics is an important incident response and law enforcement tool. However, more and more devices have started using hardware encryption to ensure that the secrets they contain are well protected. Fault injection is a technique by which injecting various types of faults into an embedded system causes it to perform in a way it wouldn&#39;t have otherwise. In this presentation, we show how we can utilize fault injection techniques to perform forensics on an encrypted device. This presentation shows how fault injection works and what it can be used for digital forensics needs.
Using fault injection attacks for digital forensics from Justin Black
]]>
135 1 https://cdn.slidesharecdn.com/ss_thumbnails/faultinjectionforforensicsv3-181122151823-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hack one iot device, break them all! /JustinBlack7/hack-one-iot-device-break-them-all hackoneiotdevicebreakthemall-final-181122145804
This presentation aims to share working knowledge on how attackers are taking an advantage of connected (IOT) devices for scaling attacks. From hardware to repeatable software exploitation that scale. X-ray on the current security resilience of some of today's connected devices. Typically challenges developers are facing today and a proof of concept attack on a "secure" connected camera with critical consequences. Finally we give valuable takeaways for improving the security of your solutions and avoid these horrible mistakes. ]]>

This presentation aims to share working knowledge on how attackers are taking an advantage of connected (IOT) devices for scaling attacks. From hardware to repeatable software exploitation that scale. X-ray on the current security resilience of some of today's connected devices. Typically challenges developers are facing today and a proof of concept attack on a "secure" connected camera with critical consequences. Finally we give valuable takeaways for improving the security of your solutions and avoid these horrible mistakes. ]]>
Thu, 22 Nov 2018 14:58:04 GMT /JustinBlack7/hack-one-iot-device-break-them-all JustinBlack7@slideshare.net(JustinBlack7) Hack one iot device, break them all! JustinBlack7 This presentation aims to share working knowledge on how attackers are taking an advantage of connected (IOT) devices for scaling attacks. From hardware to repeatable software exploitation that scale. X-ray on the current security resilience of some of today's connected devices. Typically challenges developers are facing today and a proof of concept attack on a "secure" connected camera with critical consequences. Finally we give valuable takeaways for improving the security of your solutions and avoid these horrible mistakes. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hackoneiotdevicebreakthemall-final-181122145804-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation aims to share working knowledge on how attackers are taking an advantage of connected (IOT) devices for scaling attacks. From hardware to repeatable software exploitation that scale. X-ray on the current security resilience of some of today&#39;s connected devices. Typically challenges developers are facing today and a proof of concept attack on a &quot;secure&quot; connected camera with critical consequences. Finally we give valuable takeaways for improving the security of your solutions and avoid these horrible mistakes.
Hack one iot device, break them all! from Justin Black
]]>
148 1 https://cdn.slidesharecdn.com/ss_thumbnails/hackoneiotdevicebreakthemall-final-181122145804-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Top 10 secure boot mistakes /slideshow/top-10-secure-boot-mistakes/123716417 top10securebootmistakes-181122144218
An overview of all things that can go wrong when developers attempt to implement a Chain of Trust also called "secure boot". Starting from design mistakes, we look at crypto problems, logical and debug problems and move towards Side Channel Attacks and Fault Injection. Focused on Automotive, Pay-TV, Gaming and mobile devices. ]]>

An overview of all things that can go wrong when developers attempt to implement a Chain of Trust also called "secure boot". Starting from design mistakes, we look at crypto problems, logical and debug problems and move towards Side Channel Attacks and Fault Injection. Focused on Automotive, Pay-TV, Gaming and mobile devices. ]]>
Thu, 22 Nov 2018 14:42:18 GMT /slideshow/top-10-secure-boot-mistakes/123716417 JustinBlack7@slideshare.net(JustinBlack7) Top 10 secure boot mistakes JustinBlack7 An overview of all things that can go wrong when developers attempt to implement a Chain of Trust also called "secure boot". Starting from design mistakes, we look at crypto problems, logical and debug problems and move towards Side Channel Attacks and Fault Injection. Focused on Automotive, Pay-TV, Gaming and mobile devices. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/top10securebootmistakes-181122144218-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An overview of all things that can go wrong when developers attempt to implement a Chain of Trust also called &quot;secure boot&quot;. Starting from design mistakes, we look at crypto problems, logical and debug problems and move towards Side Channel Attacks and Fault Injection. Focused on Automotive, Pay-TV, Gaming and mobile devices.
Top 10 secure boot mistakes from Justin Black
]]>
234 6 https://cdn.slidesharecdn.com/ss_thumbnails/top10securebootmistakes-181122144218-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-JustinBlack7-48x48.jpg?cb=1612791304 I am an international business development and sales manager with a passion for building lasting customer relationships. I have a strong passion for security and have unique experience selling security services, premium embedded security training, pen testing tools and development services. www.riscure.com https://cdn.slidesharecdn.com/ss_thumbnails/whoneedsiotsecurity-181122153354-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/who-needs-iot-security/123721965 Who needs iot security? https://cdn.slidesharecdn.com/ss_thumbnails/faultinjectionforforensicsv3-181122151823-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/using-fault-injection-attacks-for-digital-forensics/123720468 Using fault injection ... https://cdn.slidesharecdn.com/ss_thumbnails/hackoneiotdevicebreakthemall-final-181122145804-thumbnail.jpg?width=320&height=320&fit=bounds JustinBlack7/hack-one-iot-device-break-them-all Hack one iot device, b...