Hackable Security Modules - Reversing and Exploiting a FIPS 140-2 Lvl 3 HSM Firmware
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore the security vulnerabilities of Hardware Security Modules (HSMs) in this conference talk from Recon 2017. Delve into the evaluation of the Utimaco SecurityServer, focusing on its Texas Instruments TMS320C64x DSP architecture. Learn about the unique features of this exotic architecture, including multiple functional units and parallel command execution. Discover the challenges in disassembling the firmware and how the capstone disassembler was extended to address these issues. Follow the methodology used to uncover a vulnerability in the HSM's firmware, gaining insights into reverse engineering techniques for specialized hardware. Understand the critical role of HSMs in web security, digital signatures, and DNSSEC, and the potential implications of their vulnerabilities.
Syllabus
Recon 2017 Brx - Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware
Taught by
Recon Conference
Related Courses
Ethical Hacking in 15 Hours - 2023 Edition - Learn to HackCyber Mentor via YouTube Contextomy - Let's Debug Together
nullcon via YouTube macOS Security Features Bypasses by Example
nullcon via YouTube Exploiting Android Messengers with WebRTC
nullcon via YouTube XNU Heap Exploitation - From Kernel Bug to Kernel Control
nullcon via YouTube