L16: System HW attacks

Materials

Use the raw slides (pdf) before lecture to take notes.

  • We discuss hardware-based attacks on systems that bypass security mechanisms implemented by the OS in software.
  • Rubber ducky attacks
  • Thunderstrike family of attacks
  • Cold boot attacks
  • Some countermeasures: secure boot processes