Introduction to Hardware (In)security with the Chip Whisperer-Nano
It's well known that network-connected systems need to secure themselves against remote attackers. But what could a person do with a device if they could actually hold it in their hands? A lot, it turns out!
Join me in this workshop as we discuss the many ways an electronic device could become compromised by a knowledgeable person with physical access to a device.
Participants will then use a ChipWhisperer - Nano (or simulated data from one) to conduct:
- a differential power analysis (DPA) attack to recover the private key of a device performing AES128 encryption and
- a voltage fault injection attack to bypass the password login in a UART shell.
To complete the workshop, participants will need
- a ChipWhisperer-Nano (available from Mouser [Mouser #: 343-NAE-CWNANO]) or
- simulated data (provided by the instructor).
To save time during the workshop, participants can navigate to chipwhisperer.readthedocs.io to ensure they've downloaded the necessary software, following the download instructions for either their OS or for VirtualBox.


No comments or questions yet. Be the first to start the conversation!