The secrets inside your IoT chip
The popularity of IoT solutions is already well known and is becoming more and more present in our lives. Developers want to preserve their intellectual property (and their secrets!) and to do so they use the code readout protection capabilities provided by microcontrollers. However, these are not always sufficient and sometimes it is possible to access the contents of the microcontrollers' memory, allowing the binary to be dumped and facilitating further attacks or revealing cryptographic keys. Does this mean that physical access means game over for the defender? Is it not possible to defend ourselves in an environment where attackers have physical access to our systems? What exactly are the differences between a microcontroller and a microprocessor? What techniques do attackers use to breach IoT systems and what countermeasures has the industry developed to protect itself? In this session we will try to answer these questions and we will demonstrate in a practical way the most known attacks that allow us to breach the read prote
Hacking VillageThe popularity of IoT solutions is already well known and is becoming more and more present in our lives. Developers want to preserve their intellectual property (and their secrets!) and to do so they use the code readout protection capabilities provided by microcontrollers. However, these are not always sufficient and sometimes it is possible to access the contents of the microcontrollers' memory, allowing the binary to be dumped and facilitating further attacks or revealing cryptographic keys. Does this mean that physical access means game over for the defender? Is it not possible to defend ourselves in an environment where attackers have physical access to our systems? What exactly are the differences between a microcontroller and a microprocessor? What techniques do attackers use to breach IoT systems and what countermeasures has the industry developed to protect itself? In this session we will try to answer these questions and we will demonstrate in a practical way the most known attacks that allow us to breach the read prote