YoVDO

Hackable Security Modules - Reversing and Exploiting a FIPS 140-2 Lvl 3 HSM Firmware

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Cryptography Courses Reverse Engineering Courses Exploit Development Courses Firmware Analysis Courses Vulnerability Research Courses

Course Description

Overview

Explore the security vulnerabilities of Hardware Security Modules (HSMs) in this conference talk from Recon 2017. Delve into the evaluation of the Utimaco SecurityServer, focusing on its Texas Instruments TMS320C64x DSP architecture. Learn about the unique features of this exotic architecture, including multiple functional units and parallel command execution. Discover the challenges in disassembling the firmware and how the capstone disassembler was extended to address these issues. Follow the methodology used to uncover a vulnerability in the HSM's firmware, gaining insights into reverse engineering techniques for specialized hardware. Understand the critical role of HSMs in web security, digital signatures, and DNSSEC, and the potential implications of their vulnerabilities.

Syllabus

Recon 2017 Brx - Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware


Taught by

Recon Conference

Related Courses

Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack
Cyber Mentor via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
macOS Security Features Bypasses by Example
nullcon via YouTube
Exploiting Android Messengers with WebRTC
nullcon via YouTube
XNU Heap Exploitation - From Kernel Bug to Kernel Control
nullcon via YouTube