In hardware security analysis, success and failure are predetermined by one's tools. Coping with overwhelming streams of data can be near impossible in software alone. Implementing accurate timing can also prove to be challenging without a custom logic implementation. The solution to many of these issues is offloading much of the work to purpose-built dedicated logic. In this talk we introduce Die Datenkrake (DDK) a low-cost open source hardware project for hardware reverse engineering that implements the best of both worlds. The DDK utilizes two ICs: an Actel Field Programmable Gate Array (FPGA) and a common NXP ARM Cortex-M3 Microcontroller (MCU). The FPGA is used to implement custom logic and provides several common embedded buses to the target device. The ARM MCU provides a user interface with a straight-forward configuration of the FPGA as well as a data interface to the PC. We use the capabilities of both ICs to implement efficient hardware designs with minimal overhead and software data processing. The talk will cover the features and design decisions made during the DDK?s development and design. We will cover the limitations of current embedded hardware analysis tools, from low-end to state-of-the art professional equipment. One of the main goals of the project is to highlight the advantage of offloading certain hardware functions to custom logic. For this reason, several common hardware attack vectors will be covered and we will present how they can be implemented by utilizing the DDK. Most importantly, we will be presenting practical examples where hardware analysis would have been hindered significantly absent the DDK.
Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.
Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.