Completed
Glitching the Security Access Check Results
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
There Will Be Glitches - Extracting and Analyzing Automotive Firmware Efficiently
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Today we target an Instrument Cluster
- 3 Let's get our target's firmware!
- 4 Quick analysis of our dashboard
- 5 Fault Injection - Tooling
- 6 What happens when we glitch?
- 7 Fault Injection breaks things!
- 8 Glitching the Security Access Check Results
- 9 Glitching ReadMemoryByAddress Results
- 10 Fault Injection demo setup
- 11 Finding the right parameters: Randomize
- 12 There is a relationship!
- 13 Why not a 100% success rate? :'
- 14 The Plan
- 15 Static analysis?
- 16 Tools?
- 17 What do we need?
- 18 Emulating the CPU architecture
- 19 "Implementing" peripherals
- 20 How difficult was it?
- 21 Why write an emulator?
- 22 Execution tracing
- 23 Taint tracking
- 24 Demo Time!!!
- 25 Wrap up!
- 26 Debug interfaces
- 27 Electromagnetic Fault Injection
- 28 Fault Injection is universal
- 29 Hardening ECU hardware
- 30 Hardening ECU software
- 31 Hardening ECU design
- 32 Key takeaways
- 33 There were glitches... hopefully!;