Reverse engineering hardware for software reversers: studying an encrypted external HDD
|
|
|
- Ferdinand Allen
- 10 years ago
- Views:
Transcription
1 Reverse engineering hardware for software reversers: studying an encrypted external HDD Joffrey Czarny & Raphaël Rigo / AGI / TX5IT / Hardwear.io
2 / Hardwear.io 2
3 Introduction Why study encrypted hard drives? Initially: audit need inside Airbus Group Previous work revealed vulnerabilities Discover how to analyze hardware based on microcontrollers Previous epic fails on this type of HW Kingston/SanDisk FIPS 140-2: magic unlocking packet (2010) Corsair Padlock: data not encrypted, reachable without PIN (2008) Corsair Padlock 2: brute-forceable PIN (2010) WD Passport (yesterday s talk by Gunnar Alendal and Christian Kison) End goal Analyze the actual level of protection of user data = Validate security and cryptography implementations inside the enclosure / Hardwear.io 3
4 Introduction This talk s objectives: Describe the study of an external encrypted HDD: Explain the methodology in details Show our various failures Give leads to continue the analysis Case study: Zalman ZM-VE400 Enclosure: HDD is replaceable Optional AES-256 XTS encryption (physical keyboard) Can mount ISO as USB optical drive Really a rebranded iodd / Hardwear.io 4
5 Context, first results General security checks Verify basic crypto properties: ECB mode? statistical tests OK? Fixed key? More tests, to verify the key is not derived directly from the PIN: The same PIN, on 2 different enclosures, must lead to different encryption The same PIN, on the same enclosure, must lead to different encryption Secret material (keys, hashes) should be stored in tamper resistant hardware VE400 results Basic crypto properties: OK Encryption does not depend on enclosure: an encrypted HDD put in a new Zalman enclosure can be accessed with the right PIN Activating encryption uses 10 sectors at the end of the HDD: Not usable anymore Contain a blob of 768 bytes, of high entropy, twice / Hardwear.io 5
6 Going forward Important result: design failure Everything needed to decrypt data is stored on the HDD itself. = Efficient attacks are possible (bruteforce, key recovery) New end goal Understand the blob stored at the end of the disk: its data and its format, to implement an offline attack How? First by trying to access the firmware and/or by analyzing communications Firmware updates are encrypted, so we need to attack the hardware / Hardwear.io 6
7 Hardware analysis PCB analysis Components identification Traces and vias identification = Logical view Flash memories study Identify communication buses Flash content recovery = Flash content analysis (hopefully cleartext code) / Hardwear.io 7
8 PCB: component identification 1/2 PCB: front side System on Chip (SoC) Fujitsu MB86C311 USB3-SATA SPI flash EN25F80 PIC32MX 150F128D microcontroller / Hardwear.io 8
9 PCB: component identification 2/2 PCB: back size SPI flash EN25F / Hardwear.io 9
10 SoC and microcontroller Fujitsu MB86C311 USB3 SATA controller AES-256 XTS encryption ARM core Internal ROM and external SPI firmware support (encrypted?) PIC32MX 150F128D MIPS32 CPU (with MIPS16e support) 128 Ki of internal flash 32 Ki of RAM Supports ICSP and EJTAG Protection bits to disable external access / Hardwear.io 10
11 PCB: traces analysis (1/5): Hobo mode with GIMP / Hardwear.io 11
12 PCB: traces analysis (2/5): getting real with PCBRE [5] / Hardwear.io 12
13 PCB: traces analysis (3/5): leveling up: optical microscope / Hardwear.io 13
14 PCB: traces analysis (4/5): level cap: X-rays / Hardwear.io 14
15 PCB: traces analysis (5/5) In the end One flash dedicated to the USB-SATA controller (SoC) One flash dedicated to the PIC32 One link between the SoC and the PIC, (partially) shared with the SoC flash / Hardwear.io 15
16 PCB: logic view What s inside the flash chips? Maybe the code is in cleartext? = Let s get their contents! / Hardwear.io 16
17 Flash content recovery (1/2) Reading flash content SPI Chip desoldering needed to avoid interferences Interface using a SOIC DIP adapter to keep the board working / Hardwear.io 17
18 Flash content recovery (2/2) SPI tools GoodFET with goodfet.spiflash (recommended) Bus Pirate Raspberry Pi with spidev Results: flashes content USB-SATA controller: Plaintext configuration data (USB descriptors, etc.) Code, encrypted PIC32 microcontroller: A font, for the LCD screen Code, encrypted / Hardwear.io 18
19 Results Code access: fail All the code is encrypted, so we cannot reverse engineer the firmware What can we do now? As in network reversing, we will analyze communications (black box) How? By using a logic analyzer to capture communications / Hardwear.io 19
20 Hardware and probe placement Saleae Logic Pro 16 logic analyzer / Hardwear.io 20
21 PCB traces and components pinout / Hardwear.io 21
22 Probe placement / Hardwear.io 22
23 Screenshot / Hardwear.io 23
24 Analyzing flash SPI communications USB-SATA/PIC to flash Placing the 4 probes: simply on flash pins SPI decoding parameters: standard (cf. datasheet) Sampling speed: 50MS/s min, 100MS/s recommended (25MHz quartz) Post-treatment CSV export of decoded SPI data Ruby script to interpret flash commands: Text display Binary dump rebuilding Results PIC never writes to its external flash USB-SATA controller writes data when the PIN is validated / Hardwear.io 24
25 Analyzing SoC PIC communications USB-SATA controller PIC Probes placement: on the SOC flash pins (cf. PCB traces) Sampling speed: 50MS/s min, 100MS/s recommended Protocol: unknown Post-treatment SPI based protocol: Low level decoding with Saleae, then CSV export Application-layer data must be reversed engineered / Hardwear.io 25
26 Custom protocol Reverse engineering Preambles: AA AA AA AA 55 (SoC PIC) and A5 A5 A5 5A (PIC SoC) Type, Length, Value Frames are numbered and acknowledged Unknown 16bits checksum = Ruby script to decode data from the CSV produced by Saleae Decoded example: PIN request SoC->PIC T: 0x33, ID: 0x14 01,01,10, PIC->SoC RESP: 0x14 06,00,01,00,09,4d,01,cb, 0e,00,00,00,89,0f,3a,7a / Hardwear.io 26
27 Summary: communication sequence / Hardwear.io 27
28 Summary: communication sequence / Hardwear.io 27
29 Summary: communication sequence / Hardwear.io 27
30 Summary: communication sequence / Hardwear.io 27
31 Summary: communication sequence / Hardwear.io 27
32 Summary: communication sequence / Hardwear.io 27
33 Summary: communication sequence / Hardwear.io 27
34 Summary: communication sequence / Hardwear.io 27
35 Summary: communication sequence / Hardwear.io 27
36 Summary: communication sequence / Hardwear.io 27
37 Summary: communication sequence / Hardwear.io 27
38 Summary: communication sequence / Hardwear.io 27
39 And now? Remaining questions Can we do a hardware bruteforcer? (PIC+Keyboard emulator) No, because the hash algorithm is unknown What is inside the block at 0x1000 in the SoC flash? Flash block at 0x1000 Properties: Written when: Enabling encryption Entering a valid PIN Erased when encryption is disabled Contains 3 different blocks of data of high entropy: bits, AES-256-XTS key 1, encrypted? bits, AES-256-XTS key 2, encrypted? 3. SHA256 of previous data (1 and 2) / Hardwear.io 28
40 Designing an attack Hypothesis The block at 0x1000 seems to contain AES-XTS encryption keys, in an encrypted or obfuscated form Implications? Can we use this block to mount an attack? The idea Assuming the block at 0x1000 contains decryption keys: We will try to keep the one of the target drive intact, in the flash... while validating the PIN against a chosen blob, stored on the HDD / Hardwear.io 29
41 Theoretical steps / Hardwear.io 30
42 Theoretical steps / Hardwear.io 30
43 Theoretical steps / Hardwear.io 30
44 Theoretical steps / Hardwear.io 30
45 Theoretical steps / Hardwear.io 30
46 Theoretical steps / Hardwear.io 30
47 Theoretical steps / Hardwear.io 30
48 Theoretical steps / Hardwear.io 30
49 Theoretical steps / Hardwear.io 30
50 Theoretical steps / Hardwear.io 30
51 In practice First fail The flash status register is reset to 0 during startup Attack, second version The flash is put in read only after startup: 1. Connect the enclosure 2. Unplug flash 3. Put it in read only using GoodFET 4. Plug it back 5. Continue the attack: enter the known PIN Final result Fail. PIN code is not valid (Not match on screen) = There s probably an unidentified check / Hardwear.io 31
52 Final attack: demo / Hardwear.io 32
53 Conclusion Encrypted data security The whole security relies on: The security of the blob at the end of the disk The security of the block at 0x1000 in the flash = Everything relies on the fact that the Fujitsu firmware is secret iodd s feedback (original board dev) Firmware evolution (version 077): PIN hash is now non-deterministic The rest is not fixable: Customer support choice: data can survive broken enclosure Opaque handling of the blob at the end of the HDD: binary code provided by Fujitsu / Hardwear.io 33
54 Conclusion: going further Access the code of the USB-SATA controller Find a JTAG? (unlikely) The firmware encryption is the same on all chips: Buy the SDK? (probable NDA) Find someone generous ;) Emulate the SoC SPI flash Allows subtle modifications of block 0x1000 Try blind ARM code modifications Dump PIC32 code Use semi-invasive attack to reset protection fuse = Hardware bruteforcer by emulating the whole keyboard/screen part / Hardwear.io 34
55 End Questions? / Hardwear.io 35
56 References [1] [2] USB-stick-with-PIN-code html [3] [4] [5] [6] [7] / Hardwear.io 36
57 Blob comparison / Hardwear.io 37
58 Firmware comparison: Zalman vs PS / Hardwear.io 38
Analysis of an encrypted HDD
Analysis of an encrypted HDD J. Czarny, R. Rigo May 11, 2015 Abstract The idea of this presentation is to debunk the myth that analyzing the security of hardware is difficult. From the perspective of a
FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive
FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
SECURE USB FLASH DRIVE. Non-Proprietary Security Policy
SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
Disk encryption... (not only) in Linux. Milan Brož [email protected]
Disk encryption... (not only) in Linux Milan Brož [email protected] FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for
Reviving smart card analysis
Reviving smart card analysis Christopher Tarnovsky Karsten Nohl [email protected] [email protected] Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for
FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security
FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.2 January 31, 2013 Document Version 1.2 IBM Internet Security Systems Page 1 of
Aegis Padlock for business
Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD Olivier THOMAS Blackhat USA 2015 About Texplained Texplained [Technology Explained] refers
FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security
FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.6 January 25, 2013 Document Version 1.6 IBM Internet Security Systems Page 1 of
VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy
VASCO Data Security International, Inc. DIGIPASS GO-7 FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Security Level: 2 Version: 1.7 Date: August 12, 2015 Copyright VASCO Data Security
Presentation on Black Hat Europe 2003 Conference. Security Analysis of Microsoft Encrypting File System (EFS) http://www.elcomsoft.
Presentation on Black Hat Europe 2003 Conference Security Analysis of Microsoft Encrypting File System (EFS) Microsoft Encrypting File System Encrypting File File System System (EFS) (EFS) is is a a new
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
PL2775 JBOD / BIG / RAID0 / RAID1 Mode Application
Application Note PL2775 USB 3.0 to Dual SATA Bridge Controller User Manual (JBOD/BIG/RAID0/RAID1 Mode Features) Introduction The PL2775 is a low-power single-chip SuperSpeed USB 3.0 to Dual SATA II compliant
Cautions When Using BitLocker Drive Encryption on PRIMERGY
Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance
Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.
Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].
SNAPcell Security Policy Document Version 1.7. Snapshield
SNAPcell Security Policy Document Version 1.7 Snapshield July 12, 2005 Copyright Snapshield 2005. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE OVERVIEW...3
PMAfob Home Automation Demo
PMAfob Home Automation Demo User Guide V1.1 October 20 th, 2010 PMAfob Home Automation Demo User Guide Overview PMAfob Software PMAfob Hardware Receiver Software Receiver Hardware Setup of the PMAfob Home
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman.
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services FIPS Security Policy Version 2.42 www.northropgrumman.com/m5/ SCS Linux Kernel Cryptographic Services Security Policy Version
Bootloader with AES Encryption
...the world's most energy friendly microcontrollers Bootloader with AES Encryption AN0060 - Application Note Introduction This application note describes the implementation of a bootloader capable of
Arduino Due Back. Warning: Unlike other Arduino boards, the Arduino Due board runs at 3.3V. The maximum. Overview
R Arduino Due Arduino Due Front Arduino Due Back Overview The Arduino Due is a microcontroller board based on the Atmel SAM3X8E ARM Cortex-M3 CPU (datasheet). It is the first Arduino board based on a 32-bit
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components
Industrial Flash Storage Trends in Software and Security
January 22, 2013 Industrial Flash Storage Trends in Software and Security Many flash storage devices in embedded applications are used to save data but also function as disks for the OS. Most users are
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
How To Set Up A Hard Drive With A Harddrive With A 2Gb Hard Drive (I386) And 2Gb Drive (Amd64) On A Hardrive (I219) (Iee) (Amd66) (Ai219
1 Package Contents Device User manual Power adapter Power cord USB 2.0 Cable FireWire 800 Cable (IEEE1394.B) esata cable 2 Front View of the Device A Drive eject button B LED indicator C Front door panel
IronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
How to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
Penetration Testing Windows Vista TM BitLocker TM
Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy
i.mx USB loader A white paper by Tristan Lelong
i.mx USB loader A white paper by Tristan Lelong Introduction This document aims to explain the serial downloader feature of i.mx SoCs on Linux (available across i.mx family starting with i.mx23). This
FIPS 140-2 Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)
FIPS 140-2 Non-Proprietary Security Policy IBM Internet Security Systems SiteProtector Document Version 2.3 August 5, 2010 Document Version 2.3 IBM Internet Security Systems Page 1 of 24 Prepared For:
Horst Görtz Institute for IT-Security
Horst Görtz Institute for IT-Security On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
MARTECH SPI Tools. MARTECH SPI Tools User Manual v1.0. User Manual
MARTECH SPI Tools v1.0 Contents 1. Basic informations about the product...3 1.1 Memory types supported by SPI Tool...3 2. Main features and application possibilities...4 2.1 Technical Support activation...4
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface
Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface Application te Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface Abstract This
Broadcasting encryption or systematic #FAIL? Phil
WE 201 EK 2 42 Broadcasting encryption or systematic #FAIL? SUMMARY Intro : Broadcasting something... 1984 : Discret 11 1995 : Syster 1996 2002 : Seca 1 2002 2008 : Seca 2 Conclusion 2/49 Broadcasting
Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base
Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security
What users should know about Full Disk Encryption based on LUKS
What users should know about Full Disk Encryption based on LUKS Andrea VISCONTI Department of Computer Science Università degli Studi di Milano BunnyTN15 [email protected] December 17, 2015 1 /
Into The Droid. Gaining Access to Android User Data DEF CON 20
Into The Droid Gaining Access to Android User Data DEF CON 20 Introduction Why this talk is useful Defend access / gain access Device seizure, loss, border crossing, stop and search, espionage... The company
YubiKey Integration for Full Disk Encryption
YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The
Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Secure USB Flash Drive. Biometric & Professional Drives
Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS 140-2 Cryptographic Module Security Policy. Document Version: 1.0 Date: April 25, 2012
Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS 140-2 Cryptographic Module Security Policy Document Version: 1.0 Date: April 25, 2012 Athena Smartcard Inc. Public Material may be reproduced only
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
Dolphin In-Circuit programming Updating Firmware in the field
Dolphin In-Circuit programming Updating Firmware in the field 1 Introduction In systems e.g. gateways, where an external microcontroller is connected to a Dolphin based product like a TCM300 it might be
Encrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Fondamenti su strumenti di sviluppo per microcontrollori PIC
Fondamenti su strumenti di sviluppo per microcontrollori PIC MPSIM ICE 2000 ICD 2 REAL ICE PICSTART Ad uso interno del corso Elettronica e Telecomunicazioni 1 2 MPLAB SIM /1 MPLAB SIM is a discrete-event
MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
M68EVB908QL4 Development Board for Motorola MC68HC908QL4
M68EVB908QL4 Development Board for Motorola MC68HC908QL4! Axiom Manufacturing 2813 Industrial Lane Garland, TX 75041 Email: [email protected] Web: http://www.axman.com! CONTENTS CAUTIONARY NOTES...3 TERMINOLOGY...3
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
USBSPYDER08 Discovery Kit for Freescale MC9RS08KA, MC9S08QD and MC9S08QG Microcontrollers User s Manual
USBSPYDER08 Discovery Kit for Freescale MC9RS08KA, MC9S08QD and MC9S08QG Microcontrollers User s Manual Copyright 2007 SofTec Microsystems DC01197 We want your feedback! SofTec Microsystems is always on
Chapter 13. PIC Family Microcontroller
Chapter 13 PIC Family Microcontroller Lesson 01 PIC Characteristics and Examples PIC microcontroller characteristics Power-on reset Brown out reset Simplified instruction set High speed execution Up to
CCNA 2 Chapter 5. Managing Cisco IOS Software
1 CCNA 2 Chapter 5 Managing Cisco IOS Software The default source for Cisco IOS Software depends on the hardware platform; most commonly, though, the router looks to the configuration commands that are
IRT84. Irt84. Datasheet. EMV L1 compliant terminal with ISO14443A/B. www.asiselektronik.com.tr 1
Irt84 EMV L1 compliant terminal with ISO14443A/B contactless card reader, GPRS Modem and GPS Datasheet www.asiselektronik.com.tr 1 Overview Irt84 is a powerful terminal with contactless card reader, based
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Bypassing Self- Encrypting Drives (SED) in Enterprise Environments. Daniel Boteanu Kevvie Fowler November 12 th, 2015
Bypassing Self- Encrypting Drives (SED) in Enterprise Environments Daniel Boteanu Kevvie Fowler November 12 th, 2015 Who are we? Daniel Boteanu Forensic Technology and ediscovery, KPMG Canada M.Eng., M.Sc.
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
FLASH USB 2. 0. Introduction ENGLISH
ENGLISH FLASH RED LED (LOCKED) GREEN LED (UNLOCKED) KEY BUTTON PIN KEYS BLUE LED (ACTIVITY) Introduction Thank you for purchasing the Corsair Your new Flash Padlock 2 is a 256-bit hardware encrypted USB
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
WICE-SPI Hardware Operation Manual
Contents 1.Hardware Instruction...1 2. Pin Definition Of WICE-SPI Connector...2 3. Peripheral Circuit Arrangements...3 4. On-Board Programming...4 5. Off-Line Programming...8 1.Hardware Instruction 1.WICE-SPI
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
Computer Security. Draft Exam with Answers. 2009.
Computer Security Draft Exam with Answers. 2009. Please note that the questions written here are a draft of the final exam. There may be typos in the questions that were corrected in the final version
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
SHE Secure Hardware Extension
SHE Secure Hardware Extension Data Security for Automotive Embedded Systems Workshop on Cryptography and Embedded Security Embedded World @ Nuremberg, February 2012 Content Data Security - What does it
Lab Experiment 1: The LPC 2148 Education Board
Lab Experiment 1: The LPC 2148 Education Board 1 Introduction The aim of this course ECE 425L is to help you understand and utilize the functionalities of ARM7TDMI LPC2148 microcontroller. To do that,
V16 Pro - What s New?
V16 Pro - What s New? Welcome to the V16 Pro. If you re an experienced V16+ and WinScript user, the V16 Pro and WinScript Live will seem like old friends. In fact, the new V16 is designed to be plug compatible
Opgui and OpenProg user s guide. v.1.2
Opgui and OpenProg user s guide v.1.2 November 2014 This document refers to the applications called OpenProg and Opgui, used to control the USB programmer called Open Programmer; OpenProg runs exclusively
ESATA PCI CARD. User s Manual
ESATA PCI CARD User s Manual Introduction... 3 System Requirements... 3 RAID Introduction... 3 BIOS Configuration Utility... 5 Configuring Arrays... 5 RAID Mode Definitions... 5 BIOS Configuration Utility...
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
Block 3 Size 0 KB 0 KB 16KB 32KB. Start Address N/A N/A F4000H F0000H. Start Address FA000H F8000H F8000H F8000H. Block 2 Size 8KB 16KB 16KB 16KB
APPLICATION NOTE M16C/26 1.0 Abstract The following article describes using a synchronous serial port and the FoUSB (Flash-over-USB ) Programmer application to program the user flash memory of the M16C/26
Overview of the LTC2978 Configuration EEPROM (NVM) Revision 1.0
Overview of the LTC2978 Configuration EEPROM (NVM) Revision 1.0 Author: Mike Holloway, Rob Chiacchia, Linear Technology Date: 11/11/2010 Revision History: 1.0 Added Arrow Contact Information 0.9 Added
Implementation and Implications of a Stealth Hard-Drive Backdoor
March 3rd 2014 OSSIR/JSSI 2014 Paper first presented at ACSAC 2013 Awarded Best Student Paper Award Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach Davide Balzarotti Aure
Security Policy, DLP Cinema, Series 2 Enigma Link Decryptor
ISIONS DESCRIPTION ECO DATE APPROVED F Initial Release 2108109 06/02/10 Lee Armstrong Copyright 2010 by Texas Instruments.. Security Policy, DLP Cinema, Series 2 Enigma Link Decryptor The data in this
Security Policy: Key Management Facility Crypto Card (KMF CC)
Security Policy: Key Management Facility Crypto Card (KMF CC) Version 2.12.2 2/7/11 1.0 Introduction 3 1.1 Scope 3 1.2 Overview 3 1.3 KMF CC Implementation 4 1.4 KMF CC HW/SW version numbers 4 1.5 KMF
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
1-10 The USB PIC K150 microcontroller programmer Hardware version V2.0 File version V2.0 Product Image
1-10 The USB PIC K150 microcontroller programmer Hardware version V2.0 File version V2.0 Product Image 2-10 Product Description: K150 is the latest of a low-cost high-performance PIC programmer, support
Eureka Technology. Understanding SD, SDIO and MMC Interface. by Eureka Technology Inc. May 26th, 2011. Copyright (C) All Rights Reserved
Understanding SD, SDIO and MMC Interface by Eureka Technology Inc. May 26th, 2011 Copyright (C) All Rights Reserved Copyright by Eureka Technology Inc. All Rights Reserved Introduction This white paper
Linux. Reverse Debugging. Target Communication Framework. Nexus. Intel Trace Hub GDB. PIL Simulation CONTENTS
Android NEWS 2016 AUTOSAR Linux Windows 10 Reverse ging Target Communication Framework ARM CoreSight Requirements Analysis Nexus Timing Tools Intel Trace Hub GDB Unit Testing PIL Simulation Infineon MCDS
What is LOG Storm and what is it useful for?
What is LOG Storm and what is it useful for? LOG Storm is a high-speed digital data logger used for recording and analyzing the activity from embedded electronic systems digital bus and data lines. It
Exploring the impact of a hard drive backdoor. Jonas Zaddach
Exploring the impact of a hard drive backdoor Jonas Zaddach Outline Introduction Firmware reverse engineering Backdoor injection Remote access Discussion Conclusion About myself PhD
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD
Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode 1-2-3-4-5-6-7-8 PIN
Credit Card Fraud The Contactless Generation Kristin Paget
Credit Card Fraud The Contactless Generation Kristin Paget Chief Hacker, Recursion Ventures [email protected] @KrisPaget WHAT'S COMING UP? Contactless payments What is EMV? How does NFC fit in? Threat
C8051F020 Utilization in an Embedded Digital Design Project Course. Daren R. Wilcox Southern Polytechnic State University Marietta, Georgia
C8051F020 Utilization in an Embedded Digital Design Project Course Daren R. Wilcox Southern Polytechnic State University Marietta, Georgia Abstract In this paper, the utilization of the C8051F020 in an
HP ProtectTools Windows Mobile
HP ProtectTools Windows Mobile White Paper Introduction... 2 Risks... 2 Features... 3 Password Hashing... 4 Password Generation... 5 Password Types... 5 Strong Alphanumeric Passwords... 5 Password Lifetime...5
Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0
Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.0 Prepared for: Prepared
FANTEC MR-35DU3-6G USER MANUAL
FANTEC MR-35DU3-6G USER MANUAL Menu Menu... 1 1. Product Introduction... 2 2. Operation... 3 2.1 RAID mode setup... 4 2.1.1 JBOD Modus... 5 2.1.2 BIG Modus... 6 2.1.3 RAID0... 7 2.1.4 RAID1... 8 2.1.5
