Détail de l'auteur
Auteur Colin O'Flynn |
Documents disponibles écrits par cet auteur (31)
Article : texte imprimé
Article : texte imprimé
Article : texte imprimé
Colin O'Flynn, Auteur | 2023Article : texte imprimé
Article : texte imprimé
Colin O'Flynn, Auteur | 2023Article : texte imprimé
Article : texte imprimé
Colin O'Flynn, Auteur | 2022Article : texte imprimé
Colin O'Flynn, Auteur | 2022Article : texte imprimé
Article : texte imprimé
Article : texte imprimé
Article : texte imprimé
Colin O'Flynn, Auteur | 2022"How do you apply attacks to complete systems, and how do you test systems you might use in your day-to-day life? In this article, Colin discusses how he confirmed that an access control system he was considering to use doesn’t have a timing attack present." (Extrait de Circuit cellar ...Article : texte imprimé
Colin O'Flynn, Auteur | 2021"Upgraded Design The ChipWhisperer-Lite is an open-source tool for power analysis and fault injection. And Colin described its design in an article six years ago. Since then, the world has moved onward. Here, he talks about some adjustments required for building a new version of the ChipWhisperer, using a more ...Article : texte imprimé
Colin O'Flynn, Auteur | 2021"In this article, Colin takes a look at a recently demonstrated fault injection attack on the AirTag device. While the AirTag alone has a limited attack surface, it opens the door for a variety of additional analysis. He looks at the process of going from consumer device, to identifiable vulnerability, ...Article : texte imprimé
Colin O'Flynn, Auteur | 2021"Curves and Keys Power analysis can recover cryptographic keys from implemented algorithms. In this article, Colin works through such an attack on an ECC hardware implementation, showing how you can identify leakage of key material that makes an attack possible. Topics Discussed How power analysis can recover cryptographic keys from ...Article : texte imprimé
Colin O'Flynn, Auteur | 2021"For more than 30 years, JTAG has been a method of interacting with the digital I/O pins on devices that has been baked into most MCUs and FPGAs you use. JTAG is classically used for testing production boards, but it also presents a powerful reverse engineering tool. In this article, ...Article : texte imprimé
Colin O'Flynn, Auteur | 2021"Can you easily perform voltage fault injection on complex embedded targets like a stock Raspberry Pi 3 Model B+? In this article, Colin demonstrates how we can use the same techniques shown in previous articles by applying them to an application built on a stock Linux install on the Raspberry Pi 3 ...Article : texte imprimé
Colin O'Flynn, Auteur | 2021"Claims of improper software design related to the electronic throttle system have cost Toyota several billion dollars in settlements, government fines and other business losses. Yet the exact fault hasn't been recreated, even though at least one candidate exists in the code. In this article, COlin explores using electromagnetic fault ...Article : texte imprimé
Colin O'Flynn, Auteur | 2019"Colin summarizes some interesting presentations from the Black Hat conference in Las Vegas—along with an extra bonus event. This will help you keep up-to-date with some of the latest embedded attacks, including execute only memory attacks, fault injection on embedded devices, 4G cellular modems and FPGA bitstream hacking." (Extrait ...Article : texte imprimé
Colin O'Flynn, Auteur | 2019"Electromagnetic Fault Injection (EMFI) is a powerful method of inserting faults into embedded devices, but what does this give us ? In this article, Colin dives into a little more detail of what sort of effects EMFI has on real devices, and expands upon a few previous articles to demonstrate some ...Article : texte imprimé
Colin O'Flynn, Auteur | 2019"It's not so easy to keep with all the new security feature on the latest and greatest embedded processors - especially while you're busy focusing on the more fundamental and unique aspects of your design. In this article, Colin helps out by examining the new processor cores using TrustZone-M, a ...Article : texte imprimé
Colin O'Flynn, Auteur | 2019"Many products use USB, but have you ever considered there may be a critical security vulnerability lurking in your USB stack ? In this article, Colin walks you through an example product that could be broken using electromagnetic fault injection (EMFI) to perform this attach without even removing the device ...Article : texte imprimé
Colin O'Flynn, Auteur | 2019"Side-channel power analysis is a method of breaking security on embedded systems, and something Colin has covered extensively in his column. This time Colin shows how you can prove some of the fundamental assumptions that underpin side-channel power analysis. He suses the open-source ChipWhisperer project with Jupyter notebooks for ...Article : texte imprimé
Colin O'Flynn, Auteur | 2019"Low-cost microcontrollers integrate many powerful peripherals. You can even perform data capture directly to internal memory. In his article, Colin uses the ChipWhisperer-Nano as a case study in how you might use such features that would otherwise require external programmable logic." (Extrait de Circuit Cellar n°342)Article : texte imprimé
Colin O'Flynn, Auteur | 2018"This month Colin summarizes a few interesting presentation from the Black Hat conference in Las Vegas. He walks you through some attacks on bitcoin wallets, x86 backdoors and side channel analysis work-these and other interesting presentations from black Hat." (Extrait de Circuit Cellar n°340)