Home >

Live Q&A - The $5 Wrench: Realistic Embedded Security Threats

Colin O'Flynn - Watch Now - Duration: 19:41

Live Q&A with Colin O'Flynn for the talk titled The $5 Wrench: Realistic Embedded Security Threats
italicssurround text with
boldsurround text with
**two asterisks**
or just a bare URL
surround text with
strikethroughsurround text with
~~two tilde characters~~
prefix with

No comments or questions yet. Will you be the one who will break the ice?

11:41:43	 From  Leandro Pérez : Your talk was very interesting... How I can start to learn o understand all the concepts to protect an embedded system? The only that I applied is code flash protect fuse... but I'm not sure how can improve that.. How can I start to learn the concepts?
11:42:24	 From  Chris : Fascinating! I so want to learn more!
11:43:26	 From  enrico : What are some ways (as either hw or sw dev) to circumvent a glitch attack ?
11:46:20	 From  Keith J : Great presentation.  Scary actually.  Seeing how systems are vulnerable is good.  But, the solutions are the hard part.  Thank you Colin.
11:47:47	 From  Thomas LeMense : Can the source code for the Infineon AURIX MCU EMC exposure test be shared? It would be helpful to see what fault handling mechanisms were enabled (or not) in that particular example. (full disclosure: I am an applications engineer working for Infineon)
11:47:59	 From  Josh : It's also worth noting it's not about *perfect security* - you'll never be completely secure and claiming so will just make you a target - you just have to be *secure enough* to make it not worth attacking - in other words, you don't have to outrun the *bear*, just the other guy you're with :p
11:51:47	 From  Mark Z : Do you have a set of a guidelines that you use for safe coding? An example guideline might be "Compare secret strings in constant time".
11:51:48	 From  enrico : TAKE MY MONEY
11:52:39	 From  Thomas LeMense : sorry, my mistake - I saw the Infineon logo on a chip on the red eval board ;-)
11:53:04	 From  enrico : Colin - preferred RE tool - IDA or Ghidra and why ?
11:54:21	 From  Colin O'Flynn : https://www.riscure.com/uploads/2018/11/201708_Riscure_Whitepaper_Side_Channel_Patterns.pdf
11:55:51	 From  Mark Z : Cool Thank You! In the past I've used something similar to this:https://github.com/veorq/cryptocoding
11:56:35	 From  Colin O'Flynn : Here was the book (for when it's availbe) - https://nostarch.com/hardwarehacking
11:57:11	 From  Leandro Pérez : Yes good lab
11:58:53	 From  Rhonda : When is your book coming out?
11:59:11	 From  Leandro Pérez : lol
11:59:19	 From  patelk5 : Better than George RR Martin
11:59:32	 From  Leandro Pérez : Thanks Colin
11:59:34	 From  Gerhard : Thanks!
11:59:39	 From  Tom.Davies : Thank you Colin
11:59:45	 From  Rhonda : Great Talk!
11:59:46	 From  Gustavo : Thanks!
11:59:49	 From  Chris : Thanks Colin!
11:59:53	 From  patelk5 : Thanks!
12:00:19	 From  Keith J : Thank you Colin.
12:00:45	 From  Mikael Albertsson : Thanks Colin, great talk!