Главная
Study mode:
on
1
Intro
2
A fault injection definition...
3
Fault injection techniques
4
Type of faults
5
Secure boot in reality
6
Why use a hardware attack?
7
Why (not) fault injection on secure boot?
8
Typical assets
9
Open source tooling
10
Commercial tooling
11
Fault injection setup
12
Hash comparison
13
Mitigations
14
Combined attack: Copy
15
Combined attack: Wild Jungle jump
16
Combined attacks - Summary
17
Attacker Practicalities
18
Conclusion
Description:
Explore fault injection attacks on secure boot systems in this 27-minute conference talk from the Hack In The Box Security Conference. Delve into the vulnerabilities of standard embedded technology against hardware fault injection techniques, including power supply manipulation, electromagnetic pulses, and optical pulses. Learn how these attacks can compromise high-privilege code bases, particularly secure boot processes, potentially leading to system takeovers. Discover practical examples of fault injection attacks on embedded systems and their impact on secure boot. Gain insights into effective mitigation strategies for implementers to enhance system security against such attacks. Benefit from the expertise of Niek Timmers and Albert Spruyt, senior security analysts at Riscure, as they share their research on fault injection techniques, system-on-chip security, and the intersection of cryptography and hardware vulnerabilities.

Fault Injection Attacks on Secure Boot

Hack In The Box Security Conference
Add to list
0:00 / 0:00