Global References
This is a list of all references found in the slides:
- "98% of all produced processors run in embedded systems"
- PIC16F 8 Bit Microcontroller Family Datasheet
- AVRdude Project and Source (best use avrdude package from your distribution)
- Cross-Platform Hex Editor wxHexEditor
- Draw Circuits with EasyEDA
- Draw Circuits, PCBs and Breadboard Layouts with Fritzing
- Resistor Colour Code Calculator
- Paul Kocher, Joshua Jaffe, Benjamin Jun, “Differential Power Analysis”, Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1999
- Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying
Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nürnberger, Wenke Lee, Michael Backes.
24th Annular Symposium on Network and Distributed System Security (NDSS 2017), 2017. -
XBox360 Timing Attack http://beta.ivc.no/wiki/index.php/Xbox_360_Timing_Attack
-
Genkin, Daniel, Adi Shamir, and Eran Tromer. "RSA key extraction via low-bandwidth acoustic cryptanalysis." Annual Cryptology Conference. Springer, Berlin, Heidelberg, 2014.
-
Keyboard Electromagnetic Eavesdropper:
https://www.youtube.com/watch?v=AFWgIAgMtiA -
The TEMPEST Program by the NSA (Nowadays also certification against EM eminence)
https://www.iad.gov/iad/programs/iad-initiatives/tempest.cfm -
FYI: TEMPEST can play music https://www.youtube.com/watch?v=VqASS1ZE9R8
-
Kuhn, Markus G., and Ross J. Anderson. "Soft tempest: Hidden data transmission using electromagnetic emanations." International Workshop on Information Hiding. Springer, Berlin, Heidelberg, 1998.
-
“Lest we Remeber: Cold Boot Attacks”, J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten., USENIX Security 2008
-
Automatic Key Finder for AES & RSA
https://citp.princeton.edu/research/memory/code/ -
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes. Johannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes. ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS), 2016.
-
PAM Login util-linux/login-utils/auth.c https://github.com/karelzak/util-linux/blob/master/login-utils/auth.c
-
ChipWhisperer https://newae.com/tools/chipwhisperer/
-
“Differential Power Analysis”, Paul Kocher, Joshua Jaffe, Benjamin Jun,
Annual International Cryptology Conference.
Springer, Berlin, Heidelberg, 1999 -
Mordechai Guri, Boris Zadov, Eran Atias,Yuval Elovici, “LED it go”,
https://cyber.bgu.ac.il//advanced-cyber/system/files/LED-it-GO_0.pdf -
Song, Dawn Xiaodong, David A. Wagner, and Xuqing Tian. "Timing analysis of keystrokes and timing attacks on ssh." USENIX Security Symposium. 2001
-
Cache Side Channels: P. C. Kocher. Timing Attacks on Implementations of DiffeHellman, RSA, DSS, and Other Systems. In: Crypto’96
-
Micro-Architectural Attacks: PhD Thesis of Daniel Gruss
-
Intel Performance Analysis Guide (with memory access times)
-
ASLR on the line: Practical cache attacks on the MMU
Gras, B., Razavi, K., Bosman, E., Bos, H., & Giuffrida, C. (2017). NDSS (Feb. 2017). -
Google Retpoline https://support.google.com/faqs/answer/7625886
-
Wright, Charles V., et al. "Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?." USENIX Security Symposium. Vol. 3. 2007.
-
"Error handling of in-vehicle networks makes them vulnerable."
Cho, Kyong-Tak, and Kang G. Shin. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. -
Volkswagen Self-Study Program 238 http://www.volkspage.net/technik/ssp/ssp/SSP_238.pdf
-
Volkswagen Self-Study Program 269 (http://www.volkspage.net/technik/ssp/ssp/SSP_269_d1.pdf)
-
VatiCAN Authentication Solution is open source: http://www.automotive-security.net/vatican
-
Kneib, Marcel, and Christopher Huth. "Scission: Signal characteristic-based sender identification and intrusion detection in automotive networks." Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018.
-
Radio Frequency Spectrum from WiseGeek
-
Practical state recovery attacks against legacy RNG implementations, Shaanan Cohney, Matthew Green, Nadia Heninger https://duhkattack.com/paper.pdf
-
Rolling Code for Microcontrollers: KEELOQ from Microchip http://ww1.microchip.com/downloads/en/AppNotes/00663C.pdf
-
Samy Kamkar: “Drive it like you Hacked it” @ DEFCON 23 (https://www.youtube.com/watch?v=UNgvShN4USU )
-
“Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer”. Roel Verdult, Flavio Garcia.
https://www.cs.bham.ac.uk/~garciaf/publications/Dismantling_Megamos_Crypto.pdf -
Key Re-Installation Attack: Forcing Key Reuse in WPA2. Mathy Vanhoef, Frank Piessens.
https://papers.mathyvanhoef.com/ccs2017.pdf -
Undefined Behaviour (C/C++): https://wiki.sei.cmu.edu/confluence/display/c/CC.+Undefined+Behavior
-
Undefined Behaviour (C/C++): https://wiki.sei.cmu.edu/confluence/display/c/DD.+Unspecified+Behavior
-
Microsoft Singularity Operating System source code (written in C# / SPEC#)
-
Another C# Operating System: Cosmos
-
The Redox OS written in Rust
-
Gieraths, Antje. "Umsetzung der Anforderungen aus der ISO 26262 bei der Entwicklung eines Steuergeräts aus dem Fahrerinformationsbereich." Automotive-Safety & Security 2014(2015).
-
W. Diffie and M. Hellman. New Directions In Cryptography. In IEEE Transactions on Information Theory, vol. IT-22(6), pages 644–654, November 1976
-
Key Exchange using elektrical characteristics of CAN:
Mueller, Andreas, and Timo Lothspeich. "Plug-and-secure communication for CAN." CAN Newsletter (2015) -
SGX Sides Channels: https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-gruss.pdf