Overview
Syllabus
Intro
Eavesdropping of AES Wireless Keyboard without physical access
Firmware & NVRAM Acquisition
Firmware Acquisition - Keyboard
Firmware Acquisition - Pinout
Static Analysis - Finding Encryption functions
Static Analysis - Finding AES key
Dynamic Analysis - Debugging codes
Dynamic Analysis - Verifying Encryption functions
Firmware Modification - Modifying codes for Repeated execution
Side Channel Attacks in Real World
Side Channel Attack Environment
AES (Advanced Encryption Standard)
CPA (Correlation Power Analysis) - Recover the secret key
Template Attacks Case 1 -Same device
Template Attacks : Case 2-Difference device
Template Attacks : Case 2 - Difference device
Proposed Attacks: Case 2 - Difference device
Taught by
Black Hat