Hardware Trojans: Infiltrating the Faraday Cage

Presented at DEF CON 17 (2009), Aug. 1, 2009, 2:30 p.m. (20 minutes)

Last year we presented some hardware trojans as a proof of concept for side-channel data exfiltration attack. Pretty blinking lights are sweet, but this time we wanted to give the hungry crowd something more crunchy to bite into. Namely, that age-old problem of how to get data in and out of a device on a secured network, no network all, or even in a SCIF, perhaps... With some hardware voodoo, let's see what manner of electronic telekinesis we can accomplish! p.s. Our friends who wish to remain nameless say that this is considered trivial "on the other side of the wall". Is it really? Let's see if any show up! That's right, we're laying the bait, let's play spot the fed.

Presenters:

  • Nick Waite - CVORG, University of Delaware
    Nick Waite has been flitting about the edges of academia for years while managing to avoid graduation. During his tenure he has done analog IC design, microcontroller system design, and pcb design projects in support of military, solar, agricultural, and other Important Projects. His interests and hobbies include DIY and low-tech engineering, organic chemistry, genetic algorithms, linguistics, finance, biofeedback, outdoor survival, peace, love, and freedom. He hopes to someday find harmony between machines and nature. Make sure to ask him about Korea!
  • Stephen Janansky / afterburn - CVORG, University of Delaware   as Stephen 'afterburn' Janansky
    Stephen 'afterburn' Janansky is a Senior CPEG at UD. He can usually be found in the lab flirting on the edge between hardware and software, killing routers and other electronics by the dozens (and then asking Nick to resurrect them), and taking blinky lights to a new level. He is a member of CVORG, dreams of hardware security, and is one of the most ADD engineers you will ever meet.

Links:

Similar Presentations: