Exploitation of a Hardened MSP430-Based Device - Braden Thomas - Ekoparty Security Conference - 2014

Exploitation of a Hardened MSP430-Based Device - Braden Thomas - Ekoparty Security Conference - 2014

Ekoparty Security Conference via YouTube Direct link

Intro

1 of 29

1 of 29

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Exploitation of a Hardened MSP430-Based Device - Braden Thomas - Ekoparty Security Conference - 2014

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Unnamed real estate lockbox
  3. 3 ekey Android app
  4. 4 Programmed auth flow
  5. 5 Must access firmware
  6. 6 Physical access
  7. 7 Board photos
  8. 8 Internals
  9. 9 Reverse-engineering steps
  10. 10 MSP430 firmware extraction
  11. 11 BSL Overview
  12. 12 Voltage glitching attack
  13. 13 Results of voltage glitching
  14. 14 BSL timing attack
  15. 15 Timing attack problems
  16. 16 Timing attack results
  17. 17 Modified attack results
  18. 18 Timing attack conclusions
  19. 19 MSP430 JTAG security
  20. 20 MSP430 1/2/4xx fuse
  21. 21 MSP430 firmware reversing
  22. 22 Firmware reversing finds
  23. 23 Manufacturer's crypto architecture
  24. 24 Syscode Key
  25. 25 Third authentication mode
  26. 26 Brute Force
  27. 27 Hardware backdoor
  28. 28 Flash write+erase attack
  29. 29 Conclusions/solutions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.