Completed
Timing attack conclusions
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Supra iBox
- 3 ekey Android app
- 4 Programmed auth flow
- 5 Must access firmware
- 6 Physical access
- 7 Board photos
- 8 Internals
- 9 Reverse-engineering steps
- 10 MSP430 firmware extraction
- 11 BSL Overview
- 12 Existing BSL attacks
- 13 Voltage glitching attack
- 14 Results of voltage glitching
- 15 BSL timing attack
- 16 Timing attack problems
- 17 Timing attack game plan
- 18 Timing attack results
- 19 Modified attack results
- 20 Timing attack conclusions
- 21 MSP430 JTAG security
- 22 MSP430 1/2/4xx fuse
- 23 "Paparazzi" attack: Why?
- 24 MSP430 firmware reversing
- 25 IrDA
- 26 Firmware reversing finds
- 27 Supra crypto architecture
- 28 Syscode Key
- 29 Third authentication mode
- 30 Brute Force
- 31 Hardware backdoor
- 32 Flash write terase attack
- 33 Conclusions/solutions