Description: https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-tarnovsky.pdf This presentation is intended for individuals with an understanding of the Intel 8051 and Motorola 6805 processor families from an Assembly language perspective. This will be an interactive presentation with the audience.
Log files will be examined that have been taken from the targets (smartcards) at every clock cycle of the CPU during its runtime. We will discuss our possibilities and determine points in time (clock cycle periods) to momentarily induce a fault within the target.
Our goal will be to override the normal behavior of the target for our own use such as:
. Temporary changes- Readout of normally private records from the device
. Permanent changes- Change non-volatile memory to create a back-door or completely rewrite behavior model
Both smartcards contain a Cryptographic co-processor and are known to have been used to secure Data, PCs, laptops and Sun-Ray terminals.
Tags: securitytube , defcon , def con , hacking , hackers , information security , convention , computer security , DC 16 , Defcon 16 , dc-16 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.