Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device

Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device

Black Hat via YouTube Direct link

Intro

1 of 33

1 of 33

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Supra iBox
  3. 3 ekey Android app
  4. 4 Programmed auth flow
  5. 5 Must access firmware
  6. 6 Physical access
  7. 7 Board photos
  8. 8 Internals
  9. 9 Reverse-engineering steps
  10. 10 MSP430 firmware extraction
  11. 11 BSL Overview
  12. 12 Existing BSL attacks
  13. 13 Voltage glitching attack
  14. 14 Results of voltage glitching
  15. 15 BSL timing attack
  16. 16 Timing attack problems
  17. 17 Timing attack game plan
  18. 18 Timing attack results
  19. 19 Modified attack results
  20. 20 Timing attack conclusions
  21. 21 MSP430 JTAG security
  22. 22 MSP430 1/2/4xx fuse
  23. 23 "Paparazzi" attack: Why?
  24. 24 MSP430 firmware reversing
  25. 25 IrDA
  26. 26 Firmware reversing finds
  27. 27 Supra crypto architecture
  28. 28 Syscode Key
  29. 29 Third authentication mode
  30. 30 Brute Force
  31. 31 Hardware backdoor
  32. 32 Flash write terase attack
  33. 33 Conclusions/solutions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.