Cracking HiTag2 Crypto - Weaponising Academic Attacks for Breaking and Entering - Part 2

Presented at TROOPERS18 (2018), March 12, 2018, 2:30 p.m. (Unknown duration)

This is part 2 of the talk: Cracking HiTag2 Crypto - Weaponising Academic Attacks for Breaking and Entering


Presenters:

  • Kev Sheldrake
    Kevin Sheldrake is a penetration tester and researcher who started working in the technical security field in 1997. Over the years, Kev has been a developer and systems administrator of ‘secure' systems, an infosec policy consultant, a penetration tester, a reverse engineer and an entrepreneur who founded and ran his own security consulting company. His current interests (4+ years) are IoT, crypto and RFID; he reverse engineers and hacks devices that his employer intends to sell. He has a Masters degree, is a Chartered Engineer and, in the past, has been a CHECK Team Leader, a CISSP and held CLAS. He privately mentors others on the Stanford and Maryland crypto courses available on coursera.org. Kev has presented at 44Con on RFID crypto (Cracking HiTag2 Crypto); EMF Camp, DEFCON 4420 and DEFCON 441452 on hacking embedded devices (Inside our Toys); presented on building debuggers for embedded devices at Securi-Tay (Phun with Ptrace()); and also presented a lengthy take down on the use of NLP in Social Engineering at DEFCON 4420 (Social Engineering LIES!). He has also presented regularly at his employer's internal security conference, winning best talk in 2014 for ‘Embedded Nonsense', a talk about hacking an IoT device and reversing its crypto, which he subsequently presented at Cyber Security Challenge.

Links:

Similar Presentations: