Twesige Richard.  Advanced RISC Machines.  Set of instruction set architectures related to programing registers, CPU’s also I/O devices.  RISC acronym.

Slides:



Advertisements
Similar presentations
The problems of traditional fax Machine
Advertisements

Embedded System Lab. What is an embedded systems? An embedded system is a computer system designed for specific control functions within a larger system,
Khaled A. Al-Utaibi  Computers are Every Where  What is Computer Engineering?  Design Levels  Computer Engineering Fields  What.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter 4 Processor Technology and Architecture. Chapter goals Describe CPU instruction and execution cycles Explain how primitive CPU instructions are.
1-1 Embedded Software Development Tools and Processes Hardware & Software Hardware – Host development system Software – Compilers, simulators etc. Target.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Mobile Internet By Louise and Laura. Mobile Internet Traditionally, access to the Web has been via fixed- line services on laptops and desktop computers.
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
High Accuracy Attack Provenance via Binary-based Execution Partition Kyu Hyung Lee Xiangyu Zhang Dongyan Xu Department of Computer Science and CERIAS,
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
1 UCR Firmware Attacks and Security introduction.
CCSDS Security Working Group Spring 2014 Meeting 10 November – 14 November 2014 London, England Charles Sheehe NASA/Glenn.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
VirtualBox What you need to know to build a Virtual Machine.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
1 Application Security: Electronic Commerce and Chapter 9 Copyright 2003 Prentice-Hall.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Parallel and Distributed Simulation Introduction and Motivation.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Capabilities of Software. Object Linking & Embedding (OLE) OLE allows information to be shared between different programs For example, a spreadsheet created.
REALLY HACKING SQL SERVER 2000 Less Theory – More Action Jasper Smith.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Intrusion Detection on a Shoestring Budget Shane Williams UT Austin Graduate School of Library and Information Science Oct. 18, 2000 SANS Network Security.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Components of a Computer. Main components of a computer.. Power Supply Motherboard Central Processing Unit (CPU) Random-Access Memory (RAM) Read-Only.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Introduction TO Network Administration
Lecture 7: Overview Microprocessors / microcontrollers.
Chapter 1 Basic Concepts of Operating Systems Introduction Software A program is a sequence of instructions that enables the computer to carry.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Remote Control System 7 Cyber intelligence made easy.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
USDA 2016 Financial Management Training Transforming Shared Services Cyber Security Presented by Jack Blount.
TUF: Secure Software Updates Justin Cappos NYU Poly Computer Science and Engineering.
Mobile Architecture Aj.Drusawin Vongpramate Major of Information Technology.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 draft-urien-eap-smartcard-06.txt “EAP-Support in Smartcard”
TUF: Secure Software Updates Justin Cappos NYU Poly Computer Science and Engineering.
Popular Microcontrollers and their Selection by Lachit Dutta
network interface card (NIC)
Computer Literacy Unit 2
Nessus Vulnerability Scanning
Malware March 26, 2018.
Figure 6-4: Installation and Patching
The Effects of Jailbreaking on iPhone Security
Test 3 review FTP & Cybersecurity
Code vulnerabilities Vulnerabilities are mistakes, errors or weaknesses in a piece of software’s source code that can be directly used by a hacker to perform.
Raspberry Pi Hardware By: Mike Kwiatkowski.
Presentation transcript:

Twesige Richard

 Advanced RISC Machines.  Set of instruction set architectures related to programing registers, CPU’s also I/O devices.  RISC acronym for ‘ Reduced Instruction Set Computing ‘

 ARM technology is prevalent in cell phones and micro-controllers. Focusing on Cell Phone technology; - Cell phones have became a big advancement in turn they have become “more trusted” than the Desktop PC/Laptop. - BIGGER the number = BIGGER targets.

 How many services are running?  There weaknesses have been hard to exploit.  With more Shell codes, exploitation is simple.  Shell code, is a small piece of code used as a payload in exploitation of software vulnerability.

 This shell code above can open port 4444 on a local Linux operating machine.  It ties a Bourne shell to it with root privileges.  It could be Sent through .

 Software vulnerabilities? There has been significant improvement. - Patches. - Updates. - Bug fixes.

 How about the hardware?  For we know; - Links are complete when two physical layers of Transfer Control Protocol are connected. More attractive area of attack since; - There is lack of secure hardware development knowledge. - No hardware “patching.”

 The City of San Francisco contains approximately 23,000 “smart” electronic parking meters manufactured by MacKay. That boast tamper resistance, payment via smartcard, and usage auditing capabilities.  Evaluated San Francisco’s electronic parking meter implementation, was installed at a cost of $35 million.  Keep in mind these meters are ARM.

 Equipped with; - a stored value smartcard. These non- refillable, disposable cards can be purchased online. - A smart-card reader/writer. - Smart-card emulator.

 Now with most Cell Phones always roaming and staying connected to WIFi, there is a high chance of an attack happening right now.  With big companies like Lenovo having hardware manufactured in China; - Wouldn’t it be easy to install a 21 Century backdoor?

 Sometimes when your phone freezes, its not a glitch.  Caused by; - Trojan Horse in the complex circuitry. - A bug in chip code waiting to be triggered.

 There is an easy access to tools, manufactures guide, information about a particular hardware, hobbyist who are interested in electronics. This has made ARM and hardware hacking possible. Attackers are have gained more access to the above.  I will conclude by stating that with the growing concern that an attacker control critical hardware systems such as electrical generation and traffic management systems. Hacking through real-world examples and frequently used electronic devices is a crucial thing to learn in order for us to design better products that will pave a way for even greater technology.

 mobile-era mobile-era  shellcodes-work.html shellcodes-work.html  ardware_Safe_and_Secure.html ardware_Safe_and_Secure.html  hacker-in-your-hardware hacker-in-your-hardware  content/uploads/hacks_and_attacks_paper.pdf content/uploads/hacks_and_attacks_paper.pdf