SLIDE 1
2
Who are we ?
- R&D dept. @
Kudelski Security
- Embedded systems
security research
– Reverse engineering
- Security Evaluation
Lab @ Kudelski IoT
- Hardware attacks
– Glitch / EM – Lasers !
Defeating TLS client authentication using fault attacks Who are we - - PowerPoint PPT Presentation
Defeating TLS client authentication using fault attacks Who are we ? R&D dept. @ Security Evaluation Kudelski Security Lab @ Kudelski IoT Embedded systems Hardware attacks security research Glitch / EM Reverse
2
– Reverse engineering
– Glitch / EM – Lasers !
3
5
6
7
8
9
10
12
13
−1(h+rd)
14
15
−1
17
18
19
20
21
22
24
25
– Voltage glitch – Effects used to
26
27
28
29
30
31
32
33
34
35
36
38
39
40
“[...]We generally consider hardware fault attacks out of scope of the Mbed TLS threat model. However, we are happy to work with you on this issue and follow coordinated disclosure with the fix.
41
42
43
– Handshakes are encrypted
45
46
47
48
49
50
51