ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

DEF CON 30 - Lennert Wouters - A Black-Box Security Evaluation of SpaceX Starlink User Terminal

Автор: DEFCONConference

Загружено: 2022-10-20

Просмотров: 31219

Описание: This presentation covers the first black-box hardware security evaluation of the SpaceX Starlink User Terminal (UT). The UT uses a custom quad-core Cortex-A53 System-on-Chip that implements verified boot based on the ARM trusted firmware (TF-A) project. The early stage TF-A bootloaders, and in particular the immutable ROM bootloader include custom fault injection countermeasures. Despite the black-box nature of our evaluation we were able to bypass signature verification during execution of the ROM bootloader using voltage fault injection.

Using a modified second stage bootloader we could extract the ROM bootloader and eFuse memory. Our analysis demonstrates that the fault model used during countermeasure development does not hold in practice. Our voltage fault injection attack was first performed in a laboratory setting and later implemented as a custom printed circuit board or 'modchip'. The presented attack results in an unfixable compromise of the Starlink UT and allows us to execute arbitrary code.

Obtaining root access on the Starlink UT is a prerequisite to freely explore the Starlink network and the underlying communication interfaces.
This presentation will cover an initial exploration of the Starlink network. Other researchers should be able to build on our work to further explore the Starlink ecosystem.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
DEF CON 30 - Lennert Wouters - A Black-Box Security Evaluation of SpaceX Starlink User Terminal

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

DEF CON 30 - Kenneth Geers - Computer Hacks in the Russia-Ukraine War

DEF CON 30 - Kenneth Geers - Computer Hacks in the Russia-Ukraine War

05-BruCON 0x0E -A Black-Box Security Evaluation of the SpaceX Starlink User Terminal-Lennert Wouters

05-BruCON 0x0E -A Black-Box Security Evaluation of the SpaceX Starlink User Terminal-Lennert Wouters

DEF CON 30 - Omri Misgav - Running Rootkits Like A Nation-State Hacker

DEF CON 30 - Omri Misgav - Running Rootkits Like A Nation-State Hacker

Hardwear.io NL 2025 | Breaking The Illusion Of Security: Rowhammer Is Back On DDR5 by Patrick Jattke

Hardwear.io NL 2025 | Breaking The Illusion Of Security: Rowhammer Is Back On DDR5 by Patrick Jattke

How does Starlink Satellite Internet Work?📡☄🖥

How does Starlink Satellite Internet Work?📡☄🖥

Adam Krieger - The Three Horsemen of the AppSec AI-pocalypse

Adam Krieger - The Three Horsemen of the AppSec AI-pocalypse

DEF CON 31 - Snoop On To Them, As They Snoop On To Us -  Alan Meekins

DEF CON 31 - Snoop On To Them, As They Snoop On To Us - Alan Meekins

DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE)

DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE)

Babak Javadi - Basics of Hacking Physical Access Control Systems - DEF CON 27 Wireless Village

Babak Javadi - Basics of Hacking Physical Access Control Systems - DEF CON 27 Wireless Village

Проектирование, архитектура и углубленный анализ радиочастотной системы Starlink Dish Phased Array

Проектирование, архитектура и углубленный анализ радиочастотной системы Starlink Dish Phased Array

Столица парализована / Самая масштабная операция спецназа

Столица парализована / Самая масштабная операция спецназа

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

DEF CON 31 - Warshopping- Phreaking Smart Shopping Cart Wheels Through RF Sniffing - Joseph Gabay

DEF CON 31 - Warshopping- Phreaking Smart Shopping Cart Wheels Through RF Sniffing - Joseph Gabay

DEF CON 31 - How Vulns in Global Transportation Payment Systems Cost You - Omer Attias

DEF CON 31 - How Vulns in Global Transportation Payment Systems Cost You - Omer Attias

Intro to hardware security: UART access and SPI firmware extraction

Intro to hardware security: UART access and SPI firmware extraction

DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data -  Dennis Giese

DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data - Dennis Giese

DEF CON 23 - Colin Flynn -   Dont Whisper my Chips: Sidechannel and Glitching for Fun and Profit

DEF CON 23 - Colin Flynn - Dont Whisper my Chips: Sidechannel and Glitching for Fun and Profit

DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater

DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater

Hacker's Guide to UART Root Shells

Hacker's Guide to UART Root Shells

💥АСЛАНЯН: ВСЁ! В РФ начался НАСТОЯЩИЙ АД. Москвичи НА ГРАНИ БУНТА. Путин В АУТЕ: Москва ПОД УДАРОМ

💥АСЛАНЯН: ВСЁ! В РФ начался НАСТОЯЩИЙ АД. Москвичи НА ГРАНИ БУНТА. Путин В АУТЕ: Москва ПОД УДАРОМ

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]