Hardware attacks on the latest generation of ARM Cortex-M processors.
Most modern embedded devices have something to protect: Whether it’s cryptographic keys for your bitcoins, the password to your WiFi, or the integrity of the engine-control unit code for your car.
To protect these devices, vendors often utilise the latest processors with the newest security features: From read-out protections, crypto storage, secure-boot up to TrustZone-M on the latest ARM processors.
In this talk, we break these features: We show how it is possible to bypass the security features of modern IoT/embedded processors using fault-injection attacks, including breaking TrustZone-M on the new ARMv8-M processors.
We are also releasing and open-sourcing our entire soft- and hardware toolchain for doing so, making it possible to integrate fault-injection testing into the secure development lifecycle.
Modern devices, especially secure ones, often rely o
1 view
1393
340
1 month ago 00:01:20 1
лотА3520
2 months ago 00:16:01 1
Почему религии воюют? Какая вера самая правильная?
2 months ago 00:55:02 1
Смартфон (Новая серия!) I Фиксики. Дай пять! Бонус — сборник серий о гаджетах и технологиях
3 months ago 00:11:09 1
Одной левой 363. Креативность. Яков Шмарин и Олег Брагинский