SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Your Peripheral Has Planted Malware
—An Exploit of NXP SOCs Vulnerability
Yuwei ZHENG, Shaokun CAO, Yunding JIAN, Mingchuang QIN
UnicornTeam, 360 Technology
Defcon 26
About us
• 360 Technology is a leading Internet security company in China. Our
core products are anti-virus security software for PC and cellphones.
• UnicornTeam (https://unicorn.360.com/) was built in 2014. This is a
group that focuses on the security issues in many kinds of wireless
telecommunication systems.
• Highlighted works of UnicornTeam include:
• Low-cost GPS spoofing research (DEFCON 23)
• LTE redirection attack (DEFCON 24)
• Attack on power line communication (Black Hat USA 2016)
Agenda
• Motivation
• About Secure Boot
• Different implementations of secure boot
• Secure boot and Anti-clone
• Details of the vulnerability
• Exploitation
• Countermeasures
Motivation
• Research the Secure Boot implementations in cost-
constrained systems.
• Assess the anti-cloning strength of embedded SoCs.
• Try to find a common way to inject malware into
peripheral.
About Secure Boot
• Public key-based binary signing and verification used by Secure Boot
• Signing
1) Signer generate a key pair, K-priv and
K-pub(Certificate).
2) Calculate the binary image’s hash.
3) Encrypt the hash with K-priv,
the output is Signature.
4) Attach the Certificate(K-pub) and Signature to
binary image.
• Verification
1) Calculate the binary image’s hash
2) Decrypt the Signature with K-pub (certificate),
the output is the original Hash.
3) If the two hashes are equal, the Signature is valid,
which means binary hasn’t been modified illegally.
About Secure Boot
• The primary boot loader(PBL)
verify and load secondary
boot loader(SBL)
• The SBL verify and loader OS
kernel.
• The OS verify and load drivers
and applications.
Signature
App PuK
Application
Signature
Kernel PuK
Kernel
Root PuK in OTP
area
Signature
SBL
PBL in Boot
Rom
External Nand or
Emmc
What can Secure Boot be used for?
• Prevent firmware from being infected or added with evil features.
Two attack examples:
Inject evil features to 4G LTE modem. ([1] blackhat us14, Attacking Mobile Broadband Modems Like
A Criminal Would).
Modify the femoto cell's firmware to eavesdrop cellular users.([2]defcon 23, Hacking femoto cell).
Secure Boot can be used to mitigate these attacks.
• Protect the intellectual property of product manufacturers.
Different implementations of Secure Boot
• UEFI and Secure Boot
• Secure Boot in the smart phones
• Secure Boot in non-trustzone SOCs
Secure Boot in non-trustzone SOCs
Bootloader with IAP
Secure boot with IAP
Application
Boot Rom
Bootloader&IAP
Signature
Application
Boot Rom
APP Puk
Bootloader&IAP
Code read protection
The underground piracy industry
One-time costs
Reverse PCB: 20$ - 200$
Crack Fuse: 200$ - 5000$
Crack Fuse / OTP to
read out firmware
Buy the same
components
Reproduce PCBABatch cloning target
products
Buy one piece of target
product
Reverse PCB and
components
Unique ID with Secure Boot
Signature
Application
Boot Rom
APP Puk
Bootloader&IAP
Unique ID
Unique ID Makes Cloning Difficult
One-time costs
Reverse PCB: 20$ - 100$
Crack Fuse: 200$ - 5000$
Reverse Firmware and patch: 5000$ - 50000$ (must pay again when firmware updated)
Bypass the Secure Boot verification
• Patch?
Heavy reverse analysis work.
Firmware code is strongly position dependent.
After the firmware is upgraded, the patch will be replaced.
• Hook?
It’s easy in high level OS.
Change the behavior of firmware without modify firmware.
How to hook the functions in IOT firmware?
The normal procedure to access the Unique ID
• As shown in the figure, in the NXP’s cortex-m3, cortex-m4
classes of SoCs, a series of ROM API functions are
exported, including the function for reading Unique IDs.
The normal procedure to access the Unique ID
The Unique ID can be access with the following code snippet
#define IAP_LOCATION *(volatile unsigned int *)(0x104000100);
typedef void (*IAP)(unsigned int [],unsigned int[]);
IAP iap_entry=(IAP)IAP_LOCATION;
Use the following statement to call the IAP:
iap_entry (command, result);
To read the Unique ID, the command is 58;
The normal procedure to access the Unique ID
How to hook the functions in IOT firmware?
• Cortex M3/M4 provide a way to remap an address to a new region of
the flash and can be use to patch the ROM API entry.
What’s FPB
• FPB has two functions:
1) Generate hardware breakpoint.
Generates a breakpoint event
that puts the processor into debug
mode (halt or debug monitor
exceptions)
2) remap the literal data or
instruction to specified memory
• FPB registers can be accessed
both by JTAG or MCU itself.
FPB Registers
FP_COMP0 – 5 are used to replace instructions.
FP_COMP6 – 7 are used to replace literal data.
Name Function
FP_CTRL Flash Patch Control Register
FP_REMAP Flash Patch Remap Register
FP_COMP0 - 5 Flash Patch Comparator Register 0-5
FP_COMP6 - 7 Flash Patch Comparator Register 6-7
How FPB works0x8001000: mov.w r0,#0x8000000
0x8001004: ldr r4, =0x8001018
0x8001008: ldr r4,[r4]
…
0x8001018: dcd 0x00000000
• If we run this code normally, the result of this code will be: r0=0x8000000,and r4 = 0.
• But if we enable the fpb, then run this code, the result will be: r1 = 0x10000,and r4 = 0xffffffff;
Key point to process the FPB
• The remap table must be aligned to 32 bytes.
• The remap table must be placed in SRAM
range(0x20000000-0x30000000).
• Make sure the remap table never be replaced. Put these
value into the stack area, and move the base position of
stack pointer to dig a hole in the SRAM for it.
Code example(replace literal data)
• typedef struct
• {
• __IO uint32_t CTRL;
• __IO uint32_t REMAP;
• __IO uint32_t CODE_COMP[6];
• __IO uint32_t LIT_COMP[2];
• } FPB_Type;
• #define FPB ((FPB_Type *)0xE0002000)
• #define FPB_DATA ((volatile int*)0x0x2000bfe0)
• static const int data = -1;
• void main()
• {
• FPB->REMAP=0x2000bfe0;
• FPB->LIT_COMP[0] = (uint32_t)&data;
• FPB_DATA[6] = 0;
• FPB->CTRL = 0x00000003;
• printf(“%dn”,data);
• }
Exploitation I
• Change Unique ID to any
arbitrary value
Patch the __FPB_FUNC and FakeIAP code to
the blank area of the flash.
Patch the ResetHander to trig the
__FPB_FUNC function to execute.
Do not any changes to Application area, so the
signature is still valid.
Signature
Application
Boot Rom
App PuK
Boot image
Unique ID
__FPB_FUNC
FakeIAP
Exploitation Code
Original vector table
__vector_table
DCD sfe(CSTACK)
DCD Reset_Handler
DCD NMI_Handler
DCD HardFault_Handler
DCD MemManage_Handler
DCD BusFault_Handler
DCD UsageFault_Handler
.
.
.
Patched vector table
__vector_table
DCD sfe(CSTACK)
DCD __FPB_func
DCD NMI_Handler
DCD HardFault_Handler
DCD MemManage_Handler
DCD BusFault_Handler
DCD UsageFault_Handler
.
.
void _FPB_FUNC()
{
set_fpb_regs();
GoToJumpAddress(Reset_Handler);
}
Exploitation Code
• void fake_iap(unsigned int para,unsigned int *rp_value)
• {
• if(para[0]==58)
• {
• rp_value[0] = 0;//success
• rp_value[1] = NEW_UID_0;
• rp_value[2] = NEW_UID_1;
• rp_value[3] = NEW_UID_3;
• rp_value[4] = NEW_UID_4;
• }
• else
• {
• IAP iap_entry=(IAP)(OLD_ENTRY);
• iap_entry(para,rp_value);
• }
• return;
• }
Demo of changing UID
Exploitation ||
• Inject Hardware Trojan into Jlink debuger
• J-Link is a powerful debug tools for ARM
embedded software developer.
• It has an USB port, so it’s a good carrier
for hardware Trojan.
• The Trojan can be inject before sell to
end user.
Inject Hardware Trojan
• The J-Link-v10 use an NXP
LPC4322 chip, it is based on
cortex-m4 core. and this chip is
vulnerable.
• LPC4322 has 512K internal
flash.
• Jlink firmware use the lower
256K flash. There is enough
space to inject the Trojan
Add BadUSB into J-Link
• Modify a J-Link into a BadUSB gadget, and the J-Link
normal function keeps unchanged.
Signature
Application
Boot Rom
APP Puk
Bootloader&IAP
Unique ID
__FPB_FUNC
FakeTimerHandler
FakeIAP
Attack Flag
BadUSB
Trigger Trojan
• How to trigger the malware executing?
It can be considered that there are two sets of firmware stored in the flash, one
is the J-Link application firmware, and the other is the BadUSB Trojan firmware.
It must be ensured that the J-Link application firmware can run normally most
of the time, and users can use J-Link functions normally. The question now is
how to trigger the execution of badUSB Trojan firmware?
• Hook the timer interrupt entry
We do it by hooking the application firmware’s timer interrupt entry. When the
vector function has been executed for certain times, the BadUSB will be
triggered to execute. And if the attack is performed successfully, the attacked
flag will be reset. After that, the J-Link will continue working normally.
The details of implementation
FakeTimerHandler
Is timer reached
the target value
Set Attack
Flag
Reset chip
Call the original
TimerHandler
Power up
Jump to
Resethander of Jlink
bootloader
Is the attach flag
enabled?
Set FPB Register to
Hook ROM API and
TimerInterruptHandl
er
No
Jump to BadUSB
Firmware
Attack
Clear attack flag
Yes
Jump to
Resethander of
Jlink bootloader
Demo of BadUSB
Vulnerability mitigation measures
• Don’t leak your firmware.
• Disable the FPB before call ROM API.
• Do not leave any blank flash area.
• Pad the firmware to set the blank flash area to specific
value, For example, instructions like ‘jmp to reset’.
• You’d better always verify signature for the whole flash
area.
Affected chips
• Almost all cotex-m3, cortex-m4 of NXP
LPC13XX series, LPC15XX series, LPC17XX series,
LPC18XXseries, LPC40XX series, LPC43XX series
• Other vendors also have chips that provide UID feature,
but the UID cannot be replaced by programming FPB.
Advice from PSIRT of NXP
• Code Read Protection (CRP) Setting
Set CRP level to CRP3, to disable JTAG and ISP.
The resulting problem is the firmware of the chip also cannot be update
anymore through JTAG or ISP. So you must design an IAP instead by yourself
if you want to update firmware after your product shipped, and make sure it’s
not vulnerable.
JTAG ISP
CRP1 NO YES
CRP2 NO YES
CRP3 NO NO
Countermeasure
• It’s not a good idea to put the ROM API in an address
region that can be remapped. We recommend SoC
vendor prohibit remapping of ROM APIs in subsequent
products.
Reference
[1] Andreas Lindh, Attacking Mobile Broadband Modems Like A Criminal Would. https://www.blackhat.com/docs/us-
14/materials/us-14-Lindh-Attacking-Mobile-Broadband-Modems-Like-A-Criminal-Would.pdf
[2] Yuwei Zheng, Haoqi Shan, Build a cellular traffic sniffier with femoto cell.
https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yuwei-Zheng-
Haoqi-Shan-Build-a-Free-Cellular-Traffic-Capture-Tool-with-a-VxWorks-Based-Femto.pdf
[3] LPC4300/LPC43S00 user manual. https://www.nxp.com/docs/en/user-guide/UM10503.pdf
[4] Cortex M3 Technical Reference Manual.
http://infocenter.arm.com/help/topic/com.arm.doc.ddi0337h/DDI0337H_cortex_m3_r2p0_trm.pdf
Thank You ~

Weitere ähnliche Inhalte

Was ist angesagt?

Pythonを用いた高水準ハードウェア設計環境の検討
Pythonを用いた高水準ハードウェア設計環境の検討Pythonを用いた高水準ハードウェア設計環境の検討
Pythonを用いた高水準ハードウェア設計環境の検討Shinya Takamaeda-Y
 
HTTPを理解する
HTTPを理解するHTTPを理解する
HTTPを理解するIIJ
 
ビットコイン~原理からソースまで~
ビットコイン~原理からソースまで~ビットコイン~原理からソースまで~
ビットコイン~原理からソースまで~bitbank, Inc. Tokyo, Japan
 
年の瀬!リアルタイム通信ゲームサーバ勉強会
年の瀬!リアルタイム通信ゲームサーバ勉強会年の瀬!リアルタイム通信ゲームサーバ勉強会
年の瀬!リアルタイム通信ゲームサーバ勉強会monobit
 
PythonとVeriloggenを用いたRTL設計メタプログラミング
PythonとVeriloggenを用いたRTL設計メタプログラミングPythonとVeriloggenを用いたRTL設計メタプログラミング
PythonとVeriloggenを用いたRTL設計メタプログラミングShinya Takamaeda-Y
 
[DL輪読会] Revealing the Dark Secrets of BERT (EMNLP-IJCNLP, 2019)
[DL輪読会] Revealing the Dark Secrets of BERT (EMNLP-IJCNLP, 2019)[DL輪読会] Revealing the Dark Secrets of BERT (EMNLP-IJCNLP, 2019)
[DL輪読会] Revealing the Dark Secrets of BERT (EMNLP-IJCNLP, 2019)Deep Learning JP
 
"商用ホワイトボックス暗号方式" に対する "鍵回復攻撃" by アン・サンファン
"商用ホワイトボックス暗号方式" に対する "鍵回復攻撃" by アン・サンファン"商用ホワイトボックス暗号方式" に対する "鍵回復攻撃" by アン・サンファン
"商用ホワイトボックス暗号方式" に対する "鍵回復攻撃" by アン・サンファンCODE BLUE
 
AndroidとPCのみでスマート電球BLEハッキング
AndroidとPCのみでスマート電球BLEハッキングAndroidとPCのみでスマート電球BLEハッキング
AndroidとPCのみでスマート電球BLEハッキングShota Shinogi
 
Zynq + Vivado HLS入門
Zynq + Vivado HLS入門Zynq + Vivado HLS入門
Zynq + Vivado HLS入門narusugimoto
 
一人でもNFC開発
一人でもNFC開発一人でもNFC開発
一人でもNFC開発Hirokuma Ueno
 
【Unity道場】スマートフォンゲームでお金を稼ぐときにやっておくべきいくつかのこと
【Unity道場】スマートフォンゲームでお金を稼ぐときにやっておくべきいくつかのこと【Unity道場】スマートフォンゲームでお金を稼ぐときにやっておくべきいくつかのこと
【Unity道場】スマートフォンゲームでお金を稼ぐときにやっておくべきいくつかのことUnity Technologies Japan K.K.
 
ゲーム向けマネジメントツール 「Hansoft」の概要と コンシューマ開発で1年間 運用した事例
ゲーム向けマネジメントツール「Hansoft」の概要とコンシューマ開発で1年間運用した事例ゲーム向けマネジメントツール「Hansoft」の概要とコンシューマ開発で1年間運用した事例
ゲーム向けマネジメントツール 「Hansoft」の概要と コンシューマ開発で1年間 運用した事例Hiroyuki Tanaka
 
Pythonの処理系はどのように実装され,どのように動いているのか? 我々はその実態を調査すべくアマゾンへと飛んだ.
Pythonの処理系はどのように実装され,どのように動いているのか? 我々はその実態を調査すべくアマゾンへと飛んだ.Pythonの処理系はどのように実装され,どのように動いているのか? 我々はその実態を調査すべくアマゾンへと飛んだ.
Pythonの処理系はどのように実装され,どのように動いているのか? 我々はその実態を調査すべくアマゾンへと飛んだ.kiki utagawa
 
Redmineを快適に使うためのおすすめ初期設定
Redmineを快適に使うためのおすすめ初期設定Redmineを快適に使うためのおすすめ初期設定
Redmineを快適に使うためのおすすめ初期設定Go Maeda
 
nRF51のGPIOTEについて
nRF51のGPIOTEについてnRF51のGPIOTEについて
nRF51のGPIOTEについてHirokuma Ueno
 
UnrealEngine4で合成音声を使いたい
UnrealEngine4で合成音声を使いたいUnrealEngine4で合成音声を使いたい
UnrealEngine4で合成音声を使いたいItsuki Inoue
 
[JPCERT/CC POC Meeting] 研究紹介 + DLLハイジャックの脆弱性
[JPCERT/CC POC Meeting] 研究紹介 + DLLハイジャックの脆弱性[JPCERT/CC POC Meeting] 研究紹介 + DLLハイジャックの脆弱性
[JPCERT/CC POC Meeting] 研究紹介 + DLLハイジャックの脆弱性Asuka Nakajima
 

Was ist angesagt? (20)

Pythonを用いた高水準ハードウェア設計環境の検討
Pythonを用いた高水準ハードウェア設計環境の検討Pythonを用いた高水準ハードウェア設計環境の検討
Pythonを用いた高水準ハードウェア設計環境の検討
 
HTTPを理解する
HTTPを理解するHTTPを理解する
HTTPを理解する
 
ビットコイン~原理からソースまで~
ビットコイン~原理からソースまで~ビットコイン~原理からソースまで~
ビットコイン~原理からソースまで~
 
年の瀬!リアルタイム通信ゲームサーバ勉強会
年の瀬!リアルタイム通信ゲームサーバ勉強会年の瀬!リアルタイム通信ゲームサーバ勉強会
年の瀬!リアルタイム通信ゲームサーバ勉強会
 
PythonとVeriloggenを用いたRTL設計メタプログラミング
PythonとVeriloggenを用いたRTL設計メタプログラミングPythonとVeriloggenを用いたRTL設計メタプログラミング
PythonとVeriloggenを用いたRTL設計メタプログラミング
 
[DL輪読会] Revealing the Dark Secrets of BERT (EMNLP-IJCNLP, 2019)
[DL輪読会] Revealing the Dark Secrets of BERT (EMNLP-IJCNLP, 2019)[DL輪読会] Revealing the Dark Secrets of BERT (EMNLP-IJCNLP, 2019)
[DL輪読会] Revealing the Dark Secrets of BERT (EMNLP-IJCNLP, 2019)
 
"商用ホワイトボックス暗号方式" に対する "鍵回復攻撃" by アン・サンファン
"商用ホワイトボックス暗号方式" に対する "鍵回復攻撃" by アン・サンファン"商用ホワイトボックス暗号方式" に対する "鍵回復攻撃" by アン・サンファン
"商用ホワイトボックス暗号方式" に対する "鍵回復攻撃" by アン・サンファン
 
AndroidとPCのみでスマート電球BLEハッキング
AndroidとPCのみでスマート電球BLEハッキングAndroidとPCのみでスマート電球BLEハッキング
AndroidとPCのみでスマート電球BLEハッキング
 
Zynq + Vivado HLS入門
Zynq + Vivado HLS入門Zynq + Vivado HLS入門
Zynq + Vivado HLS入門
 
一人でもNFC開発
一人でもNFC開発一人でもNFC開発
一人でもNFC開発
 
【Unity道場】スマートフォンゲームでお金を稼ぐときにやっておくべきいくつかのこと
【Unity道場】スマートフォンゲームでお金を稼ぐときにやっておくべきいくつかのこと【Unity道場】スマートフォンゲームでお金を稼ぐときにやっておくべきいくつかのこと
【Unity道場】スマートフォンゲームでお金を稼ぐときにやっておくべきいくつかのこと
 
ゲーム向けマネジメントツール 「Hansoft」の概要と コンシューマ開発で1年間 運用した事例
ゲーム向けマネジメントツール「Hansoft」の概要とコンシューマ開発で1年間運用した事例ゲーム向けマネジメントツール「Hansoft」の概要とコンシューマ開発で1年間運用した事例
ゲーム向けマネジメントツール 「Hansoft」の概要と コンシューマ開発で1年間 運用した事例
 
Pythonの処理系はどのように実装され,どのように動いているのか? 我々はその実態を調査すべくアマゾンへと飛んだ.
Pythonの処理系はどのように実装され,どのように動いているのか? 我々はその実態を調査すべくアマゾンへと飛んだ.Pythonの処理系はどのように実装され,どのように動いているのか? 我々はその実態を調査すべくアマゾンへと飛んだ.
Pythonの処理系はどのように実装され,どのように動いているのか? 我々はその実態を調査すべくアマゾンへと飛んだ.
 
Redmineを快適に使うためのおすすめ初期設定
Redmineを快適に使うためのおすすめ初期設定Redmineを快適に使うためのおすすめ初期設定
Redmineを快適に使うためのおすすめ初期設定
 
nRF51のGPIOTEについて
nRF51のGPIOTEについてnRF51のGPIOTEについて
nRF51のGPIOTEについて
 
UnrealEngine4で合成音声を使いたい
UnrealEngine4で合成音声を使いたいUnrealEngine4で合成音声を使いたい
UnrealEngine4で合成音声を使いたい
 
Digital e chap 4
Digital e   chap 4Digital e   chap 4
Digital e chap 4
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
UnityのMultiplayサービスの得意な事
UnityのMultiplayサービスの得意な事UnityのMultiplayサービスの得意な事
UnityのMultiplayサービスの得意な事
 
[JPCERT/CC POC Meeting] 研究紹介 + DLLハイジャックの脆弱性
[JPCERT/CC POC Meeting] 研究紹介 + DLLハイジャックの脆弱性[JPCERT/CC POC Meeting] 研究紹介 + DLLハイジャックの脆弱性
[JPCERT/CC POC Meeting] 研究紹介 + DLLハイジャックの脆弱性
 

Ähnlich wie Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability

Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit MitigationsCaptain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit MitigationsenSilo
 
Piratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigationPiratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigationPriyanka Aash
 
Reverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsReverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsEran Goldstein
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
 
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...Maksim Shudrak
 
Exploit development 101 - Part 1 - Null Singapore
Exploit development 101 - Part 1 - Null SingaporeExploit development 101 - Part 1 - Null Singapore
Exploit development 101 - Part 1 - Null SingaporeMohammed A. Imran
 
Bootloader and MMU (english)
Bootloader and MMU (english)Bootloader and MMU (english)
Bootloader and MMU (english)Sneeker Yeh
 
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kuniyasu Suzaki
 
Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Cysinfo Cyber Security Community
 
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangPractical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangLyon Yang
 
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012DefCamp
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022lior mazor
 
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1  Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1 securityxploded
 
Mickey threats inside your platform final
Mickey  threats inside your platform finalMickey  threats inside your platform final
Mickey threats inside your platform finalPacSecJP
 
Flash security past_present_future_final_en
Flash security past_present_future_final_enFlash security past_present_future_final_en
Flash security past_present_future_final_enSunghun Kim
 
XPDDS17: Approach to Native Applications in XEN on ARM - Volodymyr Babchuk, E...
XPDDS17: Approach to Native Applications in XEN on ARM - Volodymyr Babchuk, E...XPDDS17: Approach to Native Applications in XEN on ARM - Volodymyr Babchuk, E...
XPDDS17: Approach to Native Applications in XEN on ARM - Volodymyr Babchuk, E...The Linux Foundation
 
DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...
DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...
DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...Felipe Prado
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowVi Tính Hoàng Nam
 

Ähnlich wie Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability (20)

Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit MitigationsCaptain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
 
Piratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigationPiratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigation
 
Reverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsReverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentals
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable Software
 
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
 
Exploit development 101 - Part 1 - Null Singapore
Exploit development 101 - Part 1 - Null SingaporeExploit development 101 - Part 1 - Null Singapore
Exploit development 101 - Part 1 - Null Singapore
 
Bootloader and MMU (english)
Bootloader and MMU (english)Bootloader and MMU (english)
Bootloader and MMU (english)
 
What is Bootloader???
What is Bootloader???What is Bootloader???
What is Bootloader???
 
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
 
Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1
 
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangPractical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
 
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
 
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1  Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
 
IOT Exploitation
IOT Exploitation	IOT Exploitation
IOT Exploitation
 
Mickey threats inside your platform final
Mickey  threats inside your platform finalMickey  threats inside your platform final
Mickey threats inside your platform final
 
Flash security past_present_future_final_en
Flash security past_present_future_final_enFlash security past_present_future_final_en
Flash security past_present_future_final_en
 
XPDDS17: Approach to Native Applications in XEN on ARM - Volodymyr Babchuk, E...
XPDDS17: Approach to Native Applications in XEN on ARM - Volodymyr Babchuk, E...XPDDS17: Approach to Native Applications in XEN on ARM - Volodymyr Babchuk, E...
XPDDS17: Approach to Native Applications in XEN on ARM - Volodymyr Babchuk, E...
 
DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...
DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...
DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflow
 

Mehr von Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Mehr von Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Kürzlich hochgeladen

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability

  • 1. Your Peripheral Has Planted Malware —An Exploit of NXP SOCs Vulnerability Yuwei ZHENG, Shaokun CAO, Yunding JIAN, Mingchuang QIN UnicornTeam, 360 Technology Defcon 26
  • 2. About us • 360 Technology is a leading Internet security company in China. Our core products are anti-virus security software for PC and cellphones. • UnicornTeam (https://unicorn.360.com/) was built in 2014. This is a group that focuses on the security issues in many kinds of wireless telecommunication systems. • Highlighted works of UnicornTeam include: • Low-cost GPS spoofing research (DEFCON 23) • LTE redirection attack (DEFCON 24) • Attack on power line communication (Black Hat USA 2016)
  • 3. Agenda • Motivation • About Secure Boot • Different implementations of secure boot • Secure boot and Anti-clone • Details of the vulnerability • Exploitation • Countermeasures
  • 4. Motivation • Research the Secure Boot implementations in cost- constrained systems. • Assess the anti-cloning strength of embedded SoCs. • Try to find a common way to inject malware into peripheral.
  • 5. About Secure Boot • Public key-based binary signing and verification used by Secure Boot • Signing 1) Signer generate a key pair, K-priv and K-pub(Certificate). 2) Calculate the binary image’s hash. 3) Encrypt the hash with K-priv, the output is Signature. 4) Attach the Certificate(K-pub) and Signature to binary image. • Verification 1) Calculate the binary image’s hash 2) Decrypt the Signature with K-pub (certificate), the output is the original Hash. 3) If the two hashes are equal, the Signature is valid, which means binary hasn’t been modified illegally.
  • 6. About Secure Boot • The primary boot loader(PBL) verify and load secondary boot loader(SBL) • The SBL verify and loader OS kernel. • The OS verify and load drivers and applications. Signature App PuK Application Signature Kernel PuK Kernel Root PuK in OTP area Signature SBL PBL in Boot Rom External Nand or Emmc
  • 7. What can Secure Boot be used for? • Prevent firmware from being infected or added with evil features. Two attack examples: Inject evil features to 4G LTE modem. ([1] blackhat us14, Attacking Mobile Broadband Modems Like A Criminal Would). Modify the femoto cell's firmware to eavesdrop cellular users.([2]defcon 23, Hacking femoto cell). Secure Boot can be used to mitigate these attacks. • Protect the intellectual property of product manufacturers.
  • 8. Different implementations of Secure Boot • UEFI and Secure Boot • Secure Boot in the smart phones • Secure Boot in non-trustzone SOCs
  • 9. Secure Boot in non-trustzone SOCs Bootloader with IAP Secure boot with IAP Application Boot Rom Bootloader&IAP Signature Application Boot Rom APP Puk Bootloader&IAP Code read protection
  • 10. The underground piracy industry One-time costs Reverse PCB: 20$ - 200$ Crack Fuse: 200$ - 5000$ Crack Fuse / OTP to read out firmware Buy the same components Reproduce PCBABatch cloning target products Buy one piece of target product Reverse PCB and components
  • 11. Unique ID with Secure Boot Signature Application Boot Rom APP Puk Bootloader&IAP Unique ID
  • 12. Unique ID Makes Cloning Difficult One-time costs Reverse PCB: 20$ - 100$ Crack Fuse: 200$ - 5000$ Reverse Firmware and patch: 5000$ - 50000$ (must pay again when firmware updated)
  • 13. Bypass the Secure Boot verification • Patch? Heavy reverse analysis work. Firmware code is strongly position dependent. After the firmware is upgraded, the patch will be replaced. • Hook? It’s easy in high level OS. Change the behavior of firmware without modify firmware. How to hook the functions in IOT firmware?
  • 14. The normal procedure to access the Unique ID • As shown in the figure, in the NXP’s cortex-m3, cortex-m4 classes of SoCs, a series of ROM API functions are exported, including the function for reading Unique IDs.
  • 15. The normal procedure to access the Unique ID The Unique ID can be access with the following code snippet #define IAP_LOCATION *(volatile unsigned int *)(0x104000100); typedef void (*IAP)(unsigned int [],unsigned int[]); IAP iap_entry=(IAP)IAP_LOCATION; Use the following statement to call the IAP: iap_entry (command, result); To read the Unique ID, the command is 58;
  • 16. The normal procedure to access the Unique ID
  • 17. How to hook the functions in IOT firmware? • Cortex M3/M4 provide a way to remap an address to a new region of the flash and can be use to patch the ROM API entry.
  • 18. What’s FPB • FPB has two functions: 1) Generate hardware breakpoint. Generates a breakpoint event that puts the processor into debug mode (halt or debug monitor exceptions) 2) remap the literal data or instruction to specified memory • FPB registers can be accessed both by JTAG or MCU itself.
  • 19. FPB Registers FP_COMP0 – 5 are used to replace instructions. FP_COMP6 – 7 are used to replace literal data. Name Function FP_CTRL Flash Patch Control Register FP_REMAP Flash Patch Remap Register FP_COMP0 - 5 Flash Patch Comparator Register 0-5 FP_COMP6 - 7 Flash Patch Comparator Register 6-7
  • 20. How FPB works0x8001000: mov.w r0,#0x8000000 0x8001004: ldr r4, =0x8001018 0x8001008: ldr r4,[r4] … 0x8001018: dcd 0x00000000 • If we run this code normally, the result of this code will be: r0=0x8000000,and r4 = 0. • But if we enable the fpb, then run this code, the result will be: r1 = 0x10000,and r4 = 0xffffffff;
  • 21. Key point to process the FPB • The remap table must be aligned to 32 bytes. • The remap table must be placed in SRAM range(0x20000000-0x30000000). • Make sure the remap table never be replaced. Put these value into the stack area, and move the base position of stack pointer to dig a hole in the SRAM for it.
  • 22. Code example(replace literal data) • typedef struct • { • __IO uint32_t CTRL; • __IO uint32_t REMAP; • __IO uint32_t CODE_COMP[6]; • __IO uint32_t LIT_COMP[2]; • } FPB_Type; • #define FPB ((FPB_Type *)0xE0002000) • #define FPB_DATA ((volatile int*)0x0x2000bfe0) • static const int data = -1; • void main() • { • FPB->REMAP=0x2000bfe0; • FPB->LIT_COMP[0] = (uint32_t)&data; • FPB_DATA[6] = 0; • FPB->CTRL = 0x00000003; • printf(“%dn”,data); • }
  • 23. Exploitation I • Change Unique ID to any arbitrary value Patch the __FPB_FUNC and FakeIAP code to the blank area of the flash. Patch the ResetHander to trig the __FPB_FUNC function to execute. Do not any changes to Application area, so the signature is still valid. Signature Application Boot Rom App PuK Boot image Unique ID __FPB_FUNC FakeIAP
  • 24. Exploitation Code Original vector table __vector_table DCD sfe(CSTACK) DCD Reset_Handler DCD NMI_Handler DCD HardFault_Handler DCD MemManage_Handler DCD BusFault_Handler DCD UsageFault_Handler . . . Patched vector table __vector_table DCD sfe(CSTACK) DCD __FPB_func DCD NMI_Handler DCD HardFault_Handler DCD MemManage_Handler DCD BusFault_Handler DCD UsageFault_Handler . . void _FPB_FUNC() { set_fpb_regs(); GoToJumpAddress(Reset_Handler); }
  • 25. Exploitation Code • void fake_iap(unsigned int para,unsigned int *rp_value) • { • if(para[0]==58) • { • rp_value[0] = 0;//success • rp_value[1] = NEW_UID_0; • rp_value[2] = NEW_UID_1; • rp_value[3] = NEW_UID_3; • rp_value[4] = NEW_UID_4; • } • else • { • IAP iap_entry=(IAP)(OLD_ENTRY); • iap_entry(para,rp_value); • } • return; • }
  • 27. Exploitation || • Inject Hardware Trojan into Jlink debuger • J-Link is a powerful debug tools for ARM embedded software developer. • It has an USB port, so it’s a good carrier for hardware Trojan. • The Trojan can be inject before sell to end user.
  • 28. Inject Hardware Trojan • The J-Link-v10 use an NXP LPC4322 chip, it is based on cortex-m4 core. and this chip is vulnerable. • LPC4322 has 512K internal flash. • Jlink firmware use the lower 256K flash. There is enough space to inject the Trojan
  • 29. Add BadUSB into J-Link • Modify a J-Link into a BadUSB gadget, and the J-Link normal function keeps unchanged. Signature Application Boot Rom APP Puk Bootloader&IAP Unique ID __FPB_FUNC FakeTimerHandler FakeIAP Attack Flag BadUSB
  • 30. Trigger Trojan • How to trigger the malware executing? It can be considered that there are two sets of firmware stored in the flash, one is the J-Link application firmware, and the other is the BadUSB Trojan firmware. It must be ensured that the J-Link application firmware can run normally most of the time, and users can use J-Link functions normally. The question now is how to trigger the execution of badUSB Trojan firmware? • Hook the timer interrupt entry We do it by hooking the application firmware’s timer interrupt entry. When the vector function has been executed for certain times, the BadUSB will be triggered to execute. And if the attack is performed successfully, the attacked flag will be reset. After that, the J-Link will continue working normally.
  • 31. The details of implementation FakeTimerHandler Is timer reached the target value Set Attack Flag Reset chip Call the original TimerHandler Power up Jump to Resethander of Jlink bootloader Is the attach flag enabled? Set FPB Register to Hook ROM API and TimerInterruptHandl er No Jump to BadUSB Firmware Attack Clear attack flag Yes Jump to Resethander of Jlink bootloader
  • 33. Vulnerability mitigation measures • Don’t leak your firmware. • Disable the FPB before call ROM API. • Do not leave any blank flash area. • Pad the firmware to set the blank flash area to specific value, For example, instructions like ‘jmp to reset’. • You’d better always verify signature for the whole flash area.
  • 34. Affected chips • Almost all cotex-m3, cortex-m4 of NXP LPC13XX series, LPC15XX series, LPC17XX series, LPC18XXseries, LPC40XX series, LPC43XX series • Other vendors also have chips that provide UID feature, but the UID cannot be replaced by programming FPB.
  • 35. Advice from PSIRT of NXP • Code Read Protection (CRP) Setting Set CRP level to CRP3, to disable JTAG and ISP. The resulting problem is the firmware of the chip also cannot be update anymore through JTAG or ISP. So you must design an IAP instead by yourself if you want to update firmware after your product shipped, and make sure it’s not vulnerable. JTAG ISP CRP1 NO YES CRP2 NO YES CRP3 NO NO
  • 36. Countermeasure • It’s not a good idea to put the ROM API in an address region that can be remapped. We recommend SoC vendor prohibit remapping of ROM APIs in subsequent products.
  • 37. Reference [1] Andreas Lindh, Attacking Mobile Broadband Modems Like A Criminal Would. https://www.blackhat.com/docs/us- 14/materials/us-14-Lindh-Attacking-Mobile-Broadband-Modems-Like-A-Criminal-Would.pdf [2] Yuwei Zheng, Haoqi Shan, Build a cellular traffic sniffier with femoto cell. https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yuwei-Zheng- Haoqi-Shan-Build-a-Free-Cellular-Traffic-Capture-Tool-with-a-VxWorks-Based-Femto.pdf [3] LPC4300/LPC43S00 user manual. https://www.nxp.com/docs/en/user-guide/UM10503.pdf [4] Cortex M3 Technical Reference Manual. http://infocenter.arm.com/help/topic/com.arm.doc.ddi0337h/DDI0337H_cortex_m3_r2p0_trm.pdf