L16: System HW attacks
Materials
Use the raw slides (pdf) before lecture to take notes.
- We discuss hardware-based attacks on systems that bypass security mechanisms implemented by the OS in software.
- Rubber ducky attacks
- Thunderstrike family of attacks
- Cold boot attacks
- Some countermeasures: secure boot processes