Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Keep your tentacles off my bus, introducing Die Datenkrake

Type
Video
Tags
hardware hacking
Authors
Dmitry Nedospasov
Event
REcon 2013
Indexed on
Sep 17, 2014
URL
http://recon.cx/2013/video/Recon2013-Dmitry%20Nedospasov%20and%20Thorsten%20Schroder-%20Keep%20your%20tentacles%20off%20my%20bus-%20introducing%20Die%20Datenkrake.mp4
File name
Recon2013-Dmitry%20Nedospasov%20and%20Thorsten%20Schroder-%20Keep%20your%20tentacles%20off%20my%20bus-%20introducing%20Die%20Datenkrake.mp4
File size
268.4 MB
MD5
3ef9f07b630dbf54aea426d01e2b8a80
SHA1
a42d12b2c7e76c5c9dcaff476f0cccd2d3c8e137

In hardware security analysis, success and failure are predetermined by one's tools. Coping with overwhelming streams of data can be near impossible in software alone. Implementing accurate timing can also prove to be challenging without a custom logic implementation. The solution to many of these issues is offloading much of the work to purpose-built dedicated logic. In this talk we introduce Die Datenkrake (DDK) a low-cost open source hardware project for hardware reverse engineering that implements the best of both worlds. The DDK utilizes two ICs: an Actel Field Programmable Gate Array (FPGA) and a common NXP ARM Cortex-M3 Microcontroller (MCU). The FPGA is used to implement custom logic and provides several common embedded buses to the target device. The ARM MCU provides a user interface with a straight-forward configuration of the FPGA as well as a data interface to the PC. We use the capabilities of both ICs to implement efficient hardware designs with minimal overhead and software data processing. The talk will cover the features and design decisions made during the DDK?s development and design. We will cover the limitations of current embedded hardware analysis tools, from low-end to state-of-the art professional equipment. One of the main goals of the project is to highlight the advantage of offloading certain hardware functions to custom logic. For this reason, several common hardware attack vectors will be covered and we will present how they can be implemented by utilizing the DDK. Most importantly, we will be presenting practical examples where hardware analysis would have been hindered significantly absent the DDK.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !