ShmooCon 2014: Is Timing-Based Attestation the Ultimate Security Defense? ๐
Discover the latest insights on timing-based attestation at ShmooCon 2014. Is it a powerful security tool or just hype? Watch the full session and find out! More info: http://bit.ly/shmooc14

Christiaan008
1.2K views โข Apr 22, 2014

About this video
For more information visit: http://bit.ly/shmooc14
To download the video visit: http://bit.ly/shmooc14_down
Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl
Speakers: Xeno Kovah | Corey Kallenberg | John Butterworth
What if I told you it's possible to ask a drunk person if he's drunk - and get an accurate answer, by measuring the reaction time? What if I told you it's possible to design security software under the assumption that the attacker has the same privileges as the defender, and the attacker can scribble over and modify the defender's code as much as he wants, but he'll still get caught? This is what timing-based attestation is all about. Come hear about how this technique has been used in everything from PCs to PDAs and Smart Phones to wireless sensor embedded systems to the firmware for NICs and Apple USB keyboards. Then hear about how we've been stealing this fire from the ivory tower, and building it into Windows kernel drivers and Dell BIOSes, and how you can to!
To download the video visit: http://bit.ly/shmooc14_down
Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl
Speakers: Xeno Kovah | Corey Kallenberg | John Butterworth
What if I told you it's possible to ask a drunk person if he's drunk - and get an accurate answer, by measuring the reaction time? What if I told you it's possible to design security software under the assumption that the attacker has the same privileges as the defender, and the attacker can scribble over and modify the defender's code as much as he wants, but he'll still get caught? This is what timing-based attestation is all about. Come hear about how this technique has been used in everything from PCs to PDAs and Smart Phones to wireless sensor embedded systems to the firmware for NICs and Apple USB keyboards. Then hear about how we've been stealing this fire from the ivory tower, and building it into Windows kernel drivers and Dell BIOSes, and how you can to!
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
1.2K
Likes
5
Duration
01:02:48
Published
Apr 22, 2014
User Reviews
3.9
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.