Skip to main content

Detect observation and evade theft of sensitive data

posted onMarch 18, 2016
by l33tdawg

Jacob Torrey is an Advising Research Engineer at Assured Information Security, where he leads the Computer Architectures group. He has worked extensively with low-level x86 and MCU architectures, having written a BIOS, OS, hypervisor and SMM handler. His major interest is how to (mis)use an existing architecture to implement a capability currently beyond the limitations of the architecture.

Torrey is presenting at HITBSecConf Amsterdam 2016 this spring. Come see his session, Using the Observer Effect & Cyber Feng Shui, on May 26, 2016.

In this interview he talks about architectural tells that can be utilized to detect the presence of analysis tools, and offers practical tips for researchers.

Source

Tags

HITB Industry News

You May Also Like

Recent News

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th