Bypassing Secure Boot Using Fault Injection
More and more embedded systems implement Secure Boot to assure the integrity and confidentiality of all software executed after power-on reset. These implementations are bypassed using logical flaws, for example as shown in the following iPhone boot ROM exploits: SHAtter [1] and limera1n [2]. However, the early stages of Secure Boot (i.e. ROM or 1st stage bootloader) are often of insignificant size and therefore logically exploitable vulnerabilities are not guaranteed to be present.
by Albert Spruyt and Niek Timmers
Full Abstract: https://www.blackhat.com/eu-16/briefings/schedule/#bypassing-secure-boot-using-fault-injection-4808
Видео Bypassing Secure Boot Using Fault Injection канала Black Hat
by Albert Spruyt and Niek Timmers
Full Abstract: https://www.blackhat.com/eu-16/briefings/schedule/#bypassing-secure-boot-using-fault-injection-4808
Видео Bypassing Secure Boot Using Fault Injection канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Bypassing Secure Boot using Fault Injection (SHA2017)ECU Electromagnetic Fault Injection Testing #1Windows 10 Secure Boot: Sharpen your SecuritySide-Channel Attacks on Everyday ApplicationsBypassing Self-Encrypting Drives (SED) in Enterprise EnvironmentsBreaking AES with ChipWhisperer - Piece of scake (Side Channel Analysis 100)Voltage (VCC) Glitching Raspberry Pi 3 model B+ with ChipWhisperer-LiteThe Rise Of Open-Source SoftwareFault Attacks on AESAdvanced CAN Injection Techniques for Vehicle NetworksTalking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device TrackingBreaking Samsung's Root of Trust: Exploiting Samsung S10 Secure BootFirmware is the New Black - Analyzing Past Three Years of BIOS/UEFI Security VulnerabilitiesHardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)Secure Boot for Small MicrocontrollersWhat's on the Wireless? Automating RF Signal IdentificationMost Ransomware Isn't As Complex As You Might ThinkRSA Power Analysis Side-Channel Attack - rhme2Investigating Malware Using Memory Forensics - A Practical Approach