Andrew Zonenberg on Nostr: Back from a fun couple of days in Bochum presenting at the second Hardware Reverse ...
Back from a fun couple of days in Bochum presenting at the second Hardware Reverse Engineering Symposium (HARRIS) hosted by the Max Planck Institute for Security and Privacy.
The talk was titled "Secure Element vs Cloners: A Case Study". Slides will be uploaded shortly, I'll share a link here when I've had a chance to do that.
As part of this research, I and the other IOA silicon lab folks examined two generations of an undisclosed consumer product with cryptographically vendor-locked peripherals, as well as a third party clone that appeared on the market shortly after the second-generation OEM hardware design was released (implying the DRM scheme was broken as a result of a weakness in the new-gen product). We also speculate on some of the market forces that may have lead to some unusual design decisions made by the cloner.
This work is ongoing and we hope to present a deep-dive at REcon this summer with more extensive analysis. The HARRIS talk was only 15 minutes so I had to cut a lot of detail out.
The talk was titled "Secure Element vs Cloners: A Case Study". Slides will be uploaded shortly, I'll share a link here when I've had a chance to do that.
As part of this research, I and the other IOA silicon lab folks examined two generations of an undisclosed consumer product with cryptographically vendor-locked peripherals, as well as a third party clone that appeared on the market shortly after the second-generation OEM hardware design was released (implying the DRM scheme was broken as a result of a weakness in the new-gen product). We also speculate on some of the market forces that may have lead to some unusual design decisions made by the cloner.
This work is ongoing and we hope to present a deep-dive at REcon this summer with more extensive analysis. The HARRIS talk was only 15 minutes so I had to cut a lot of detail out.