Taking the guess out of Glitching Adam Laurie NULLCON Goa 2020
>> YOUR LINK HERE: ___ http://youtube.com/watch?v=eOuUBPOSn0Y
Abstract: • Fault Injection / Glitching is probably the fastest-growing methodology in hardware hacking today. Although it's been around for quite some time, it is now rapidly growing in popularity for many reasons: cheaper tools, better media/blog coverage, multiple success stories, etc. In this talk, we will look at some of the challenges faced when first trying to get into this technique and provide some practical hints and tips and what to do and what not to do to get results, how to answer some of the fundamental questions: when do I glitch? How hard/often to I glitch? Is my glitch having any effect? I'll also introduce an innovative technique for figuring out one of the most crucial of the above variables... When Do I Glitch? • About Speaker: • Adam is a Global Security Associate Partner, IBM X-Force Red Hardware Hacking Lead. • Adam is a security researcher working in the field of electronic communications who specialize in reverse engineering of secure embedded systems. He started in the computer industry in the late Seventies, working as a computer programmer on PDP-8 and other mini computers, and then on various Unix, Dos and CP/M based micro computers as they emerged in the Eighties. He quickly became interested in the underlying network and data protocols and moved his attention to those areas and away from programming, starting a data conversion company that rapidly grew to become Europe's largest specialist in that field (A.L. Downloading Services). During this period, he successfully disproved the industry lie that music CDs could not be read by computers, and wrote the world's first CD ripper, 'CDGRAB.' At this point, he became interested in the newly emerging concept of 'The Internet.' He was involved in various early open source projects, the most well known of which is probably 'Apache-SSL,' which went on to become the de-facto standard secure web server. Since the late Nineties, he has focused his attention on security. He has been the author of various papers exposing flaws in Internet services and/or software, as well as pioneering the concept of re-using military data centers housed in underground nuclear bunkers as secure hosting facilities. • Adam, aka Major Malfunction, has been a senior member of staff at DEFCON since 1997 and is the POC for the London DEFCON chapter DC4420. Over the years has given presentations on forensics, magnetic stripe, EMV, InfraRed, RF, RFID, Terrestrial and Satellite TV hacking, and, of course, Magic Moonbeams. He is the author and maintainer of the open-source python RFID exploration library 'RFIDIOt,' which can be found at http://rfidiot.org. • ----------------------------------------------------- • #Nullcon2020 #Hardware #Hacking • ----------------------------------------------------- • Follow nullcon on Facebook: / nullcon • Twitter: / nullcon • LinkedIn: / nullcon • Website: https://nullcon.net • YouTube: https://www.youtube.com/user/nullcon?...
#############################
![](http://youtor.org/essay_main.png)