Attackers vs. Security Labs
In this 30-minute presentation with Colin O’Flynn from NewAE and Jasper van Woudenberg (Riscure North America CTO), several prominent hardware attacks are discussed, comparing the attacker view and security lab view. As co-authors of the “The Hardware Hacking Handbook”, Jasper and Colin touch upon the most crucial learnings for security development, illustrating three examples of known attacks:
- Trezor Hardware Wallet: applying EMFI (electro-magnetic fault injection) to target the hardware security features.
- ECU (Engine Control Unit) for Car Tuning: applying EMFI to get access to the engine control unit used for car tuning.
- Titan Security Key: applying SCA (side-channel analysis) – specifically optical analysis – on the Titan Security Key’s chip to retrieve keys.