AI Engineer - Learn how to integrate AI into software applications
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore comprehensive physical attack methodologies against full-disk encryption systems in this 34-minute conference talk by security researchers Edouard D'hoedt and Hayk Gevorgyan. Learn about various hardware-based attack vectors that can bypass encryption protections, including cold boot attacks, direct memory access techniques, and firmware-level exploitations. Discover how attackers can extract encryption keys from system memory, manipulate boot processes, and leverage hardware vulnerabilities to compromise encrypted storage devices. Examine real-world case studies demonstrating successful attacks against popular full-disk encryption implementations, understand the technical limitations of software-based encryption when faced with physical access, and gain insights into defensive strategies and countermeasures to protect against these sophisticated attack methods. Master the fundamentals of hardware security assessment and develop a deeper understanding of the physical security considerations essential for implementing robust encryption solutions in enterprise and personal computing environments.
Syllabus
Field Guide To Physical Attacks Against Full-disk Encryption - Edouard D'hoedt & Hayk Gevorgyan
Taught by
Cooper