Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices

USENIX via YouTube

Overview

Learn about critical security vulnerabilities in IoT devices through this 22-minute conference talk from WOOT '24 that exposes fundamental weaknesses in Texas Instruments' IP Encapsulation (IPE) trusted execution environment. Discover how researchers from Virginia Tech developed RIPencapsulation, an attack that exploits lack of call site enforcement and residual state issues to compromise proprietary code and secret data on MSP430 and MSP432 devices. Explore how this attack can reveal cryptographic keys and enable unauthorized TEE memory access within minutes, even when following manufacturer security guidelines. Gain insights into the challenges of protecting IoT devices that balance complex software requirements with physical attacker access, and understand the limitations of current hardware-based security solutions.

Syllabus

WOOT '24 - RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices

Taught by

USENIX

Reviews

Start your review of RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.