Home
The Id of IoT Blog
Archive
Contact

Subscribe

New posts weekly.

Thank you!

Security Embedded is 15+ years of experience in building secure systems. Learn more about how we can help you by exploring Phil's blog or contacting us.

Security Embedded

Jul 12
Jul 12 Plaintext Symmetric Keys, fixed IVs, oh my!

Phil Vachon
Crypto Disasters

IoT devices are resource constrained. Oftentimes vendors will go to great lengths to avoid using TCP. This is not a bad decision on its own: UDP is stateless. But that means you're rolling your own resiliency in.

Jul 11
Jul 11 What's in a Firmware Load?

Phil Vachon
Hardware Security, Principia Securitas

Now that we know how the firmware is loaded, it's time to look at what the firmware looks like. For this attack to work, we need to be able to load our own code. Ideally, the device will continue to function as it was intended. How hard will this be?

Jul 10
Jul 10 Attacking Firmware Loads

Phil Vachon
Hardware Security

But before we attack the firmware, we need more information. Let's look at how control software interacts with the device.

Jul 8
Jul 8 What Are You Leaving on the FR4* Table?

Phil Vachon
Hardware Security

Most IoT hardware isn't reverse engineer resistant. Note how I don't say "reverse engineer proof." This would be a fallacy. As long as you don't control where the hardware is, you can't plan to resist every attack.

Jul 8
Jul 8 Firmware Updates Gone Wrong: Part 2

Phil Vachon
Principia Securitas, Crypto Disasters

We now know that a naive, hash-based approach has trivial weaknesses. HMAC on its own prevents image modification. But it's likely easy to steal the key for either scheme. If all devices use the same key, forging a compromised firmware image is easy. So what are our options?

Jul 7
Jul 7 Firmware Updates Gone Wrong: Part 1

Phil Vachon
Principia Securitas, Crypto Disasters

Nothing will leave your product more vulnerable than a badly designed firmware update process.

Jul 6
Jul 6 Write and Execute: Never at the Same Time

Phil Vachon
Principia Securitas

A large number of attacks on IoT devices rely on being able to write to where code can execute from. Dump your shell code into a buffer. Overwrite the return pointer on stack. Presto, you're running unauthorized code! 

Jul 4
Jul 4 Crypto is a Munition* for a Reason

Phil Vachon
Principia Securitas, Crypto Disasters

If there's one thing that is often screwed up, in all systems, it's cryptography.

Jul 2
Jul 2 Principia Securitas: How to Mitigate Threats

Phil Vachon
Principia Securitas

Embedded systems security is a balancing act. On one hand, you need a comprehensive threat model. Chances are, your device is in a malfeasant actor's hands. But, you also have limited resources with which to defend against a wide range of attacks this opens up.

Jun 30
Jun 30 Breaking Bad(ly designed hardware)

Phil Vachon
Miscellany

Hardware is magic. Software is scary. Together they are a horrifying monster. This monster will bend to the will of whoever has the magic incantation to control it.

 

Security Embedded is Phil Vachon. Phil loves breaking things, figuring out how they work, and building new things with that knowledge.

 

Home     Blog     Archive     Contact     Twitter