Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a critical security vulnerability in this DEF CON 33 conference talk that exposes how trusted security components can become attack vectors. Discover the ReVault attack methodology that targets a specific security chip embedded in over 100 laptop models, demonstrating how low-privilege users can completely compromise these supposedly secure components. Learn the technical details of how attackers can extract secrets from the chip, establish persistent access to application firmware, and leverage this compromise to attack the host Windows system. Understand the implications when security chips designed to protect valuable assets like passwords, cryptographic keys, and biometric data become compromised, turning from protectors into threats. Gain insights into the attack chain that allows privilege escalation from limited user access to full system compromise through exploitation of trusted hardware security modules.
Syllabus
DEF CON 33 - ReVault! Compromised by your Secure SoC - Christopher 'xoreaxeaxeax' Domas
Taught by
DEFCONConference