Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Reverse Engineering Custom ASICs By Exploiting Supply-Chain Leaks

Hack In The Box Security Conference via YouTube

Overview

Explore hardware reverse engineering techniques for custom chips and vulnerability discovery using Siemens S7-1200 (v1 and v4) series as case studies. Delve into the process of analyzing Application Specific Integrated Circuits (ASICs) in SCADA systems, focusing on identifying standardized modules and custom functionalities. Learn how leaked circuit boards from Chinese online shops facilitated the reverse engineering of over 60% of chip pins. Discover methods for protocol and voltage level identification using oscilloscopes, as well as resistance measurement techniques for component connections. Gain insights into locating interfaces for flash memories, RAM, and JTAG ports on both chip versions. Uncover the specifications of the SoCs used in different S7-1200 series, including the Fujitsu ARM-BE chip in v1 and the ARM-Cortex-R4 r1p3 in v4. Explore the creation of a working debug setup with a JTAG adapter for the newer PLC series, enabling memory manipulation, breakpoint setting, and live debugging capabilities applicable to all S7-1200 devices.

Syllabus

#HITBHaxpo D2 - Reverse Engineering Custom ASICs By Exploiting Supply-Chain Leaks - Thomas Weber

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Reverse Engineering Custom ASICs By Exploiting Supply-Chain Leaks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.