Cracking the MSP430 BSL
Veröffentlicht am: 27.12.2008, 20:30 Uhr
Präsentation vom: 27.12.2008, 20:30 Uhr
Autor: Travis Goodspeed
Abstract: The Texas Instruments MSP430 low-power microcontroller is used in many medical, industrial, and consumer devices. When its JTAG fuse is blown, the device's firmware is kept private only a serial bootstrap loader (BSL), certain revisions of which are vulnerable to a side-channel timing analysis attack. This talk continues that from Black Hat USA by describing the speaker's adventures in creating a hardware device for exploiting this vulnerability.
Speakers: Travis Goodspeed
Room: Saal 3