SAN JOSE, Calif. – Hacking has two hats—black and white—and you can try on both for size at Design West 2013.
[Click here to register for DESIGN West 2013, April 22-25 at the San Jose McEnery Convention Center. Options range from an All-Access Pass -- which includes Black Hat (security) Conference Session to Free Expo Admission].
The black hats have their own appeal, like an in-yer-face Quentin Tarantino flick, so let’s get right to them. Info for white hats about hacks they need to know about will surface at the Black Hat Embedded Security Summit.
This is a key element of the reinvigorated DESIGN conference program.
The Black Hat Embedded Security Summit provides electronics professionals with essential information and tools, as well as a forum for the discussion and evaluation of the latest solutions for securing their embedded systems from threats in today's global environment. This year's event program will showcase training courses focused on topics such as Network Security, Incident Response, Web Application Security, and Exploit Development.
Five black hacks captured my attention when I wandered through the program. My favorite is a session on hacking your car that might have caught my eye because I have a jammed door lock on my 2004 Honda CRV.
The session Vehicle Network on Tuesday, April 23 at 3:15pm has a decidedly more high tech focus than my mundane mechanical problems. It takes it for granted that today’s car is a network on wheels and goes about showing you how to perform—and prevent--a Denial of Service attack on it.
Presenter Robert Leale of CanBusHack Inc. will report on which cars he found easiest and hardest to hack. Might be worth the price of admission just to find out how your vehicle fared. As for my old buggy—even I can’t get into it!
Sorry, but I loose all respect for a journalist when they use the words "robot apocalypse" in an article.
You might think you were being ironic, but it is lazy and pernicious and every article written about robotics seems to be trying to scare the public.
This isn't 1950. No rational person believes that robots have, or are even capable of, hostile intent any more.
It is exactly that short of ill-informed Luddite attitude that gave China & Japan the scientific lead over the USA in robotics.
I had the pleasure of working (mentoring?) Colin during one of his co-op work terms (5th page - Power Analysis for Cheapskates) a number of years ago. At the time, my interest was in the simplification of the mathematics involved to decrypt RSA ... which was merely a brute force attack combined with modelling of acceptable ranges. Power analysis was a concept which attacked decryption based on the profiling of routines required to decrypt internally and using that to extrapolate results ... why try to enter through the locked front door when the window is left wide open. Great idea.
David Patterson, known for his pioneering research that led to RAID, clusters and more, is part of a team at UC Berkeley that recently made its RISC-V processor architecture an open source hardware offering. We talk with Patterson and one of his colleagues behind the effort about the opportunities they see, what new kinds of designs they hope to enable and what it means for today’s commercial processor giants such as Intel, ARM and Imagination Technologies.