Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Human Interface Device Attack Vector Research and Development

via YouTube

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the world of Human Interface Device (HID) attack vectors in this 29-minute conference talk from Derbycon 2015. Delve into the research and development of Stable24, a programmable HID, as Alexander Livingston Sega guides you through various aspects of this cybersecurity topic. Learn about the binary to Teensy conversion, the advantages of using HIDs in attacks, and the psychological factors involved. Examine the technical details of driver frameworks, interrupts, device objects, and driver models. Gain insights from industry experts like Kevin Mitnick, Bruce Schneider, and Chris Nickerson. Understand the importance of driver signing and discover the potential implications of HID-based attacks in the realm of cybersecurity.

Syllabus

Intro
The Binary to Teensy
The Programmable Human Interface Device
Why Use a Human Interface Device
Chemical Facts
Too Much Truth
Maslows Hierarchy
Trust Your Instincts
Kevin Mitnick
Bruce Schneider
Chris Nickerson
Pure Software
Driver Framework
Interrupts
Device Object
Driver Model
Driver Signing
Conclusion

Reviews

Start your review of The Human Interface Device Attack Vector Research and Development

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.