Torturing OpenSSL
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive analysis of hardware vulnerabilities in secure computing systems through this Black Hat USA 2012 conference talk. Delve into a detailed end-to-end security attack on a microprocessor system, demonstrating how hardware weaknesses can be exploited to compromise software-secure systems. Learn about a side-channel attack on the RSA signature algorithm using transient hardware faults induced through various methods. Discover the process of extracting private RSA keys from erroneously signed messages affected by single-bit faults during Fixed Window Exponentiation. Examine the attack implementation using an FPGA platform with a SPARC-based microprocessor running unmodified Linux and OpenSSL. Understand the implications of this attack, which requires only proximity to the victim system and leaves no detectable trail. Witness a live demonstration of the attack on an FPGA platform using a simplified 128-bit private key system.
Syllabus
Introduction
Cryptography is everywhere
Consumer devices
RSA Authentication
How does it work
Authentication
Attacks
Faults
Theory
Hardware
Openssl Authentication
Private Key Instruction
Simple Case
Fault Injection
Final Result
Last Attempt
Analysis
Conclusions
Takehome message
Taught by
Black Hat
Related Courses
Service Mesh - Crash Course on ISTIO - Part 2Kode Kloud via YouTube Just Enough Istio to be Dangerous
Udemy Remoticon 2021 - Colin O'Flynn Zaps Chips and They Talk
Hackaday via YouTube FPGA Glitching & Side Channel Attacks
Hackaday via YouTube Can Applications Recover from fsync Failures?
USENIX via YouTube