Samy Kamkar explores how hidden physical inputs expose systems to exploitation beyond software boundaries.
Modern security failures often emerge far beyond keyboards, code and screens. Physical systems, embedded devices and everyday electronics expose unintended inputs that leak data, accept manipulation or respond to invisible forces. By examining how energy moves through hardware, environments and materials, attackers can bypass intended controls without touching traditional interfaces. Temperature, light, sound, electromagnetism and power all function as pathways that shape system behavior and undermine assumptions about isolation and trust. Understanding these pathways reframes security as a problem of physics as much as software, revealing how hidden inputs enable firmware extraction, credential recovery and covert control of devices once considered hardened.
In this session, led by Samy Kamkar, independent security researcher, you will learn:
- Identifying how hidden physical inputs alter system behavior beyond intended interfaces;
- Examining why energy transfer creates exploitable side-channel leakage;
- Analyzing how temperature, sound and light enable nontraditional data extraction.
Here is the course outline:
Signals, Silence and Secrets: Exploiting Hidden Physical and Digital Inputs |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |
