Can We Break the Fault Injection Mitigation Bob?
This talk explores the fundamentals of fault injection, delves into the inner workings of such attacks, and examines countermeasures for protection. Talk also goes indepth about various ways to bypass all these software based countermeasures. Additionally, an open-source vulnerable fault injection application will be released, allowing attendees to experiment with and analyze vulnerabilities.
Introduction: Fault injection is a powerful Hardware technique used to assess the security and robustness of hardware and software systems. By deliberately introducing hardware faults, it helps identify vulnerabilities that could be exploited by attackers. In this talk, we will provide a comprehensive overview of Hardware based fault injection, covering attacks, countermeasures, and introducing an open-source vulnerable application for experimentation and learning.
Section 1: Understanding Fault Injection (200 words) We will start by providing a clear understanding of Hardware fault injection. We will explain the concept, its significance in security testing, and its application in identifying system weaknesses. We will discuss the different types of fault injection attacks, including voltage and clock glitches, electromagnetic interference.
Section 2: Exploring Fault Injection Attacks (300 words) In this section, we will dive deeper into fault injection attacks. We will examine real-world examples and case studies to illustrate the potential impact of these attacks on system integrity and security. We will explore how fault injection can manipulate instructions, bypass security measures, and compromise system behavior. By understanding the underlying mechanisms and vulnerabilities exploited by attackers, we can better appreciate the need for robust countermeasures.
Section 3: Countermeasures against Fault Injection Attacks (300 words) To mitigate the risks associated with fault injection attacks, effective countermeasures are essential. We will discuss various commonly usd techniques and strategies employed to protect systems against these attacks. This will include double checks, random delay, using complex number and many more . We will demonstrate how to bypass each one of the mitigation and the underlying principle of the attacks on them.
Section 4: Introducing the Open-Source Vulnerable Application (150 words) As part of this talk, we will release an open-source vulnerable application that can be flashed onto any arduino compatible hardware. This application will simulate various fault injection scenarios, allowing attacker to experiment with different attack techniques and observe their impact on system behavior. By providing this hands-on experience, we aim to enhance understanding and awareness of fault injection vulnerabilities and encourage the development of effective countermeasures.
About the Speaker
Arun Magesh works as Principal Security Consultant at ONEKEY and has worked on numerous smart devices pentest in the past couple of years. He also builds open source tools and tutorials to aid embedded hacking. He has delivered training to numerous governmental and private organizations around the world. He is also a speaker and trainer at several conferences like BlackHat, DEFCON, HackInParis, NullCon, zer0con, RISC, Intel Devfest, EFY IoT Conference and brucon. His main focus area in IoT is embedded device and SDR security.