Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins

Black Hat via YouTube

Overview

This course teaches learners how to implement malware inside Intel SGX to stealthily steal Bitcoins. The course covers topics such as using SGX to implement Bitcoin wallets, cache attacks, prime and rope techniques, physical address manipulation, sidechain resistant crypto, DRM video player exploitation, and more. The teaching method involves a presentation that demonstrates practical implementation and detection evasion techniques. This course is intended for individuals interested in cybersecurity, cryptography, and advanced exploitation techniques.

Syllabus

Outline
Introduction to SGX
Using SGX to implement Bitcoin wallets
Bitcoins Signatures
Cache Attacks
Prime and Rope
How does this work
Not that easy
Building the time
Physical address
Physical page
Addresses
Summary
Results
Performance Counter
Solution
Operating System
Hardware
Sidechain resistant crypto
DRM video player
Stealing Bitcoins
The Problem
Validity Period
Double Fetch Back
Shared Memory
Double Fetch Detection
Video Player Exploit
Double Fetches
Atomic Fetches
TFX
How it works
Dropit
Code
Advantages
Takeaways
Out of Scope
Conclusion

Taught by

Black Hat

Reviews

Start your review of When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.