New: enable viewer-created translations and captions on your YouTube channel!
Already have subtitles for this video?
Upload them directly.
Use the following code to embed this video. See our usage guide for more details on embedding.
Paste this in your document somewhere (closest to the closing body tag is preferable):
Paste this inside your HTML body, where you want to include the widget:
<div class="amara-embed" data-url="http://www.youtube.com/watch?v=XcEYkcwbRX8" data-team="null"></div>
Most thought Direct Memory Access (DMA) attacks were a thing of the past after CPU vendors introduced IOMMUs and OS vendors blocked Firewire DMA. At least until the PCILeech direct memory access attack toolkit was presented a year ago and quickly became popular amongst red teamers and governments alike.
A year later the situation has improved but some firmware and operating systems still remain vulnerable by default. The hardware used to perform the attacks was however limited both in capabilities and supply. FPGA support was introduced and made available to the public to overcome these problems. In this talk I will subvert kernels, defeat full disk encryption and spawn system shells - all by using affordable publically available FPGAs and open source software!