Completed
Physical access
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Exploitation of a Hardened MSP430-Based Device - Braden Thomas - Ekoparty Security Conference - 2014
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Unnamed real estate lockbox
- 3 ekey Android app
- 4 Programmed auth flow
- 5 Must access firmware
- 6 Physical access
- 7 Board photos
- 8 Internals
- 9 Reverse-engineering steps
- 10 MSP430 firmware extraction
- 11 BSL Overview
- 12 Voltage glitching attack
- 13 Results of voltage glitching
- 14 BSL timing attack
- 15 Timing attack problems
- 16 Timing attack results
- 17 Modified attack results
- 18 Timing attack conclusions
- 19 MSP430 JTAG security
- 20 MSP430 1/2/4xx fuse
- 21 MSP430 firmware reversing
- 22 Firmware reversing finds
- 23 Manufacturer's crypto architecture
- 24 Syscode Key
- 25 Third authentication mode
- 26 Brute Force
- 27 Hardware backdoor
- 28 Flash write+erase attack
- 29 Conclusions/solutions