Главная
Study mode:
on
1
Intro
2
Background
3
What is glitching
4
Glitch instructions
5
GlitchKit process
6
Escape attack
7
Chip whisperer
8
Glitch timing
9
GlitchKit
10
GlitchKit Sections
11
Hardware
12
USB Transactions
13
Code
Description:
Explore fault injection techniques and open-source tools for reverse engineering closed systems in this 48-minute conference talk. Learn about GlitchKit, an open-source hardware and firmware solution that simplifies the process of fault-injecting into new systems and extracting firmware secrets. Discover the development progress, witness demonstrations of GlitchKit in simple attacks, and find out how to participate in the ongoing development of these open-source tools. Gain insights from security researchers Dominic Spill and Kate Temkin as they discuss glitching techniques, escape attacks, chip whispering, glitch timing, and the various components of GlitchKit. Delve into the hardware aspects, USB transactions, and code implementation involved in this innovative approach to opening closed systems.

Opening Closed Systems With GlitchKit

0xdade
Add to list