Detect observation and evade theft of sensitive data

Jacob Torrey is an Advising Research Engineer at Assured Information Security, where he leads the Computer Architectures group. He has worked extensively with low-level x86 and MCU architectures, having written a BIOS, OS, hypervisor and SMM handler. His major interest is how to (mis)use an existing architecture to implement a capability currently beyond the limitations of the architecture.

Torrey is presenting at HITBSecConf Amsterdam 2016 this spring. Come see his session, Using the Observer Effect & Cyber Feng Shui, on May 26, 2016.

In this interview he talks about architectural tells that can be utilized to detect the presence of analysis tools, and offers practical tips for researchers.