Close
#IOTSWC24
Parallel Session

The secrets inside your IoT chip

Hacking Village

Wednesday 01, 15:00h - 15:20h | Hacking Village
01-02-2023 15:00 01-02-2023 15:20 Europe/Madrid The secrets inside your IoT chip

The popularity of IoT solutions is already well known and is becoming more and more present in our lives. Developers want to preserve their intellectual property (and their secrets!) and to do so they use the code readout protection capabilities provided by microcontrollers. However, these are not always sufficient and sometimes it is possible to access the contents of the microcontrollers' memory, allowing the binary to be dumped and facilitating further attacks or revealing cryptographic keys. Does this mean that physical access means game over for the defender? Is it not possible to defend ourselves in an environment where attackers have physical access to our systems? What exactly are the differences between a microcontroller and a microprocessor? What techniques do attackers use to breach IoT systems and what countermeasures has the industry developed to protect itself? In this session we will try to answer these questions and we will demonstrate in a practical way the most known attacks that allow us to breach the read prote Hacking Village


The popularity of IoT solutions is already well known and is becoming more and more present in our lives. Developers want to preserve their intellectual property (and their secrets!) and to do so they use the code readout protection capabilities provided by microcontrollers. However, these are not always sufficient and sometimes it is possible to access the contents of the microcontrollers' memory, allowing the binary to be dumped and facilitating further attacks or revealing cryptographic keys. Does this mean that physical access means game over for the defender? Is it not possible to defend ourselves in an environment where attackers have physical access to our systems? What exactly are the differences between a microcontroller and a microprocessor? What techniques do attackers use to breach IoT systems and what countermeasures has the industry developed to protect itself? In this session we will try to answer these questions and we will demonstrate in a practical way the most known attacks that allow us to breach the read prote

Speakers

Pedro Mier

Pedro Mier holds a degree in Telecommunications Engineer ing from the Polytechnic University of Catalonia, MBA from ESADE and PADE from IESE. He is currently President of AMETIC (Association of Electronics, Information Technology and Telecommunications Companies of Spain), Shareholder and Chairman of the Board of Directors of TRYO Aerospace & Electronics, Board Member of the Premo Group and Committee of CTTC. member of Space Angels Network and Member of the Sc ientific Advisory

Close