Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Attacking an Open Source U2F Device in 30 Minutes or Less

media.ccc.de via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security features and vulnerabilities of FIDO U2F tokens in this 29-minute conference talk from media.ccc.de. Delve into the open-source implementation of a FIDO U2F token developed and certified by the Federal Office for Information Security (BSI). Examine the unique opportunity provided by access to both source code and certification documents. Learn about a design flaw (CVE-2022-33172) in the de.fac2 Java Card applet and understand how an attacker could potentially bypass user presence checks to execute unauthorized operations. Discover the process of identifying and testing this vulnerability without physical access to the device, and learn about the subsequent disclosure and mitigation efforts by the BSI.

Syllabus

What de.fac2? Attacking an opensource U2F device in 30 minutes or less

Taught by

media.ccc.de

Reviews

Start your review of Attacking an Open Source U2F Device in 30 Minutes or Less

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.