Star 0

Abstract


Karsten is a cryptographer and security researcher. He likes to test security assumptions in proprietary systems and typically breaks them.

[Abstract] This talk introduces a new form of malware that operates from controller chips inside USB devices. Peripherals can be reprogrammed in order to take control of a computer, exfiltrate data, or spy on the user. We demonstrate a full system compromise from USB and a self-replicating USB virus not detectable with current defenses. In addition to the BlackHat material, he will add at least one new tech demo for POC and discuss the vendor/market response to the research.

Slides