All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate... Share: Download MP3 Similar Tracks IMP4GT: IMPersonation Attacks in 4G NeTworks Black Hat Demystifying Modern Windows Rootkits Black Hat The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation Black Hat DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 DEFCONConference Practical Defenses Against Adversarial Machine Learning Black Hat Decade of the RATs – Custom Chinese Linux Rootkits for Everyone Black Hat Reverse Engineering the Tesla Battery Management System to increase Power Available Black Hat Firmware security, why it matters and how you can have it linux.conf.au Detecting Access Token Manipulation Black Hat How do Graphics Cards Work? Exploring GPU Architecture Branch Education Spyware at The Hardware Level - Intel ME & AMD PSP Mental Outlaw 36C3 - Uncover, Understand, Own - Regaining Control Over Your AMD CPU media.ccc.de The mind behind Linux | Linus Torvalds | TED TED But what are Hamming codes? The origin of error correction 3Blue1Brown TPM (Trusted Platform Module) - Computerphile Computerphile BlackLotus - How UEFI Secure Boot Became a Gateway for Cyber Attacks Eclypsium Testing a $100 Mini PC: The Bmax B1 Plus ExplainingComputers Intel AMT Stealth Breakthrough Black Hat Deep-dive into the technology of AMD's MI300 High Yield Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller Black Hat