University of Cambridge > > Computer Laboratory Security Seminar > Teardown of encrypted USB Flash drives

Teardown of encrypted USB Flash drives

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Jack Hughes.

There are many solutions for keeping user data secure on USB Flash drives. However, the most reliable ones are based on hardware encryption. Many encrypted USB Flash drives are certified to the high FIPS 140 -2 Level 3 standard. However, very little public research has been done to evaluate the hardware security of those devices.

The purpose of this talk is to present a teardown and feasibility study of IronKey and other encrypted USB Flash drives. As a result the users of these devices could be assured about the real level of the security protection they get. More than 20 different devices were teared down and their hardware solutions evaluated against possible attacks. Some potential flaws will be exposed and those findings are likely to stimulate further research into specific solutions being used to protect the user data.

RECORDING : Please note, this event will be recorded and will be available after the event for an indeterminate period under a CC BY -NC-ND license. Audience members should bear this in mind before joining the webinar or asking questions.

This talk is part of the Computer Laboratory Security Seminar series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.


© 2006-2024, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity