Détail de l'auteur
Auteur Colin O'Flynn |
Documents disponibles écrits par cet auteur (30)
Ajouter le résultat dans votre panier Faire une suggestion Affiner la recherche
Article : texte imprimé
Article : texte imprimé
Colin O'Flynn, Auteur | 2022"How do you apply attacks to complete systems, and how do you test systems you might use in your day-to-day life? In this article, Colin discusses how he confirmed that an access control system he was considering to use doesn’t have a timing attack present." (Extrait de Circuit cellar ...Article : texte imprimé
Colin O'Flynn, Auteur | 2021"Upgraded Design The ChipWhisperer-Lite is an open-source tool for power analysis and fault injection. And Colin described its design in an article six years ago. Since then, the world has moved onward. Here, he talks about some adjustments required for building a new version of the ChipWhisperer, using a more ...Article : texte imprimé
Colin O'Flynn, Auteur | 2021"In this article, Colin takes a look at a recently demonstrated fault injection attack on the AirTag device. While the AirTag alone has a limited attack surface, it opens the door for a variety of additional analysis. He looks at the process of going from consumer device, to identifiable vulnerability, ...Article : texte imprimé
Colin O'Flynn, Auteur | 2021"Curves and Keys Power analysis can recover cryptographic keys from implemented algorithms. In this article, Colin works through such an attack on an ECC hardware implementation, showing how you can identify leakage of key material that makes an attack possible. Topics Discussed How power analysis can recover cryptographic keys from ...Article : texte imprimé
Colin O'Flynn, Auteur | 2021"For more than 30 years, JTAG has been a method of interacting with the digital I/O pins on devices that has been baked into most MCUs and FPGAs you use. JTAG is classically used for testing production boards, but it also presents a powerful reverse engineering tool. In this article, ...Article : texte imprimé
Colin O'Flynn, Auteur | 2021"Can you easily perform voltage fault injection on complex embedded targets like a stock Raspberry Pi 3 Model B+? In this article, Colin demonstrates how we can use the same techniques shown in previous articles by applying them to an application built on a stock Linux install on the Raspberry Pi 3 ...Article : texte imprimé
Colin O'Flynn, Auteur | 2021"Claims of improper software design related to the electronic throttle system have cost Toyota several billion dollars in settlements, government fines and other business losses. Yet the exact fault hasn't been recreated, even though at least one candidate exists in the code. In this article, COlin explores using electromagnetic fault ...Article : texte imprimé
Colin O'Flynn, Auteur | 2019"Colin summarizes some interesting presentations from the Black Hat conference in Las Vegas—along with an extra bonus event. This will help you keep up-to-date with some of the latest embedded attacks, including execute only memory attacks, fault injection on embedded devices, 4G cellular modems and FPGA bitstream hacking." (Extrait ...Article : texte imprimé
Colin O'Flynn, Auteur | 2019"Electromagnetic Fault Injection (EMFI) is a powerful method of inserting faults into embedded devices, but what does this give us ? In this article, Colin dives into a little more detail of what sort of effects EMFI has on real devices, and expands upon a few previous articles to demonstrate some ...