Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers

USENIX via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 12-minute conference talk from USENIX Security '24 that investigates security vulnerabilities in Texas Instruments MSP430 microcontrollers' Intellectual Property Encapsulation (IPE) technology. Dive into an in-depth security evaluation that reveals fundamental protection shortcomings in current IPE hardware, demonstrating how software-level attack techniques from trusted execution environments (TEEs) can be applied to this platform. Learn about a newly discovered attack primitive called "controlled call corruption" that exploits vulnerabilities in the IPE access control mechanism, leading to complete bypass of confidentiality and integrity guarantees. Understand the proposed lightweight hardware modifications for securing IPE and discover a prototype framework that implements software responsibilities to reduce information leakage while utilizing the onboard memory protection unit to restore security guarantees on vulnerable devices with minimal performance impact.

Syllabus

USENIX Security '24 - Intellectual Property Exposure: Subverting and Securing Intellectual...

Taught by

USENIX

Reviews

Start your review of Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.