ReVault! Compromised by your Secure SoC
Learn Generative AI, Prompt Engineering, and LLMs for Free
Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a critical security vulnerability in this DEF CON 33 conference talk that exposes how trusted security components can become attack vectors. Discover the ReVault attack methodology that targets a specific security chip embedded in over 100 laptop models, demonstrating how low-privilege users can completely compromise these supposedly secure components. Learn the technical details of how attackers can extract secrets from the chip, establish persistent access to application firmware, and leverage this compromise to attack the host Windows system. Understand the implications when security chips designed to protect valuable assets like passwords, cryptographic keys, and biometric data become compromised, turning from protectors into threats. Gain insights into the attack chain that allows privilege escalation from limited user access to full system compromise through exploitation of trusted hardware security modules.
Syllabus
DEF CON 33 - ReVault! Compromised by your Secure SoC - Christopher 'xoreaxeaxeax' Domas
Taught by
DEFCONConference