Главная
Study mode:
on
1
Intro
2
Today we target an Instrument Cluster
3
Let's get our target's firmware!
4
Quick analysis of our dashboard
5
Fault Injection - Tooling
6
What happens when we glitch?
7
Fault Injection breaks things!
8
Glitching the Security Access Check Results
9
Glitching ReadMemoryByAddress Results
10
Fault Injection demo setup
11
Finding the right parameters: Randomize
12
There is a relationship!
13
Why not a 100% success rate? :'
14
The Plan
15
Static analysis?
16
Tools?
17
What do we need?
18
Emulating the CPU architecture
19
"Implementing" peripherals
20
How difficult was it?
21
Why write an emulator?
22
Execution tracing
23
Taint tracking
24
Demo Time!!!
25
Wrap up!
26
Debug interfaces
27
Electromagnetic Fault Injection
28
Fault Injection is universal
29
Hardening ECU hardware
30
Hardening ECU software
31
Hardening ECU design
32
Key takeaways
33
There were glitches... hopefully!;
Description:
Explore automotive security vulnerabilities and hacking techniques in this Black Hat conference talk. Delve into the world of extracting and analyzing automotive firmware efficiently, focusing on an Instrument Cluster as the target. Learn about fault injection techniques, including tooling and glitching methods to bypass security checks and access memory. Discover the process of finding optimal parameters through randomization and understand the challenges of achieving a 100% success rate. Examine static analysis approaches, emulation of CPU architecture, and implementation of peripherals. Gain insights into execution tracing, taint tracking, and the importance of debug interfaces. Discuss electromagnetic fault injection, universal applicability of fault injection techniques, and strategies for hardening ECU hardware, software, and design. Acquire key takeaways on automotive security and the prevalence of glitches in embedded systems.

There Will Be Glitches - Extracting and Analyzing Automotive Firmware Efficiently

Black Hat
Add to list
0:00 / 0:00