Keep your tentacles off my bus, introducing Die Datenkrake.: A Programmable Logic Platform for Hardware Reverse-Engineering

Presented at REcon 2013, June 21, 2013, 11 a.m. (60 minutes)

In hardware security analysis, success and failure are predetermined by one's tools. Coping with overwhelming streams of data can be near impossible in software alone. Implementing accurate timing can also prove to be challenging without a custom logic implementation. The solution to many of these issues is offloading much of the work to purpose-built dedicated logic. In this talk we introduce Die Datenkrake (DDK) a low-cost open source hardware project for hardware reverse engineering that implements the best of both worlds.

Presenters:

  • Thorsten Schröder
    Thorsten Schröder has been active as a technical consultant in the field of applied IT-Security for many years. His areas of expertise lie in the verification of software in either source or binary form. More recently, Thorsten's research has resulted in several open source hardware projects, most notably the "Keykeriki", an RF-analysis tool for sniffing and attacking 2.4GHz based radio devices such as wireless keyboards. Thorsten has also been involved in several software reverse-engineering projects such as the CCC's analysis of the German Federal Trojan known as "0zapftis". Thorsten is the co-founder of the Swiss modzero AG, established in 2011, as well as the German branch, modzero GmbH, established in January 2013.
  • Dmitry Nedospasov
    Dmitry Nedospasov is a PhD student and researcher in the field of IC security at the Security in Telecommunications (SECT) research group at the Berlin University of Technology (TU Berlin) and the Telekom Innovation Laboratories. Dmitry's research interests include hardware and IC reverse-engineering as well as physical attacks against ICs and embedded systems. His academic research focuses on developing new and novel techniques for semi and fully-invasive IC analysis. Most recently, Dmitry was involved in identifying vulnerabilities in the most wide-spread Phyiscally Unclonable Function (PUF) schemes.

Links:

Similar Presentations: