YoVDO

Fault Injection Attacks on Secure Boot

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Embedded Systems Courses Hardware Security Courses Secure Boot Courses

Course Description

Overview

Explore fault injection attacks on secure boot systems in this 27-minute conference talk from the Hack In The Box Security Conference. Delve into the vulnerabilities of standard embedded technology against hardware fault injection techniques, including power supply manipulation, electromagnetic pulses, and optical pulses. Learn how these attacks can compromise high-privilege code bases, particularly secure boot processes, potentially leading to system takeovers. Discover practical examples of fault injection attacks on embedded systems and their impact on secure boot. Gain insights into effective mitigation strategies for implementers to enhance system security against such attacks. Benefit from the expertise of Niek Timmers and Albert Spruyt, senior security analysts at Riscure, as they share their research on fault injection techniques, system-on-chip security, and the intersection of cryptography and hardware vulnerabilities.

Syllabus

Intro
A fault injection definition...
Fault injection techniques
Type of faults
Secure boot in reality
Why use a hardware attack?
Why (not) fault injection on secure boot?
Typical assets
Open source tooling
Commercial tooling
Fault injection setup
Hash comparison
Mitigations
Combined attack: Copy
Combined attack: Wild Jungle jump
Combined attacks - Summary
Attacker Practicalities
Conclusion


Taught by

Hack In The Box Security Conference

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera