SAN JOSE – Security experts will show vulnerabilities in everything from ARM processors to x86 CPUs and even hotel locks at the annual Black Hat conference in Las Vegas this week. A handful of sessions will detail security holes in broad sets of embedded systems as well as mainstream systems software including Apple’s iOS, HTML 5 and Microsoft’s as yet unreleased Windows 8.
The Black Hat session aim to expose sometimes shocking vulnerabilities in widely used products. They also typically show countermeasures to plug the holes.
Two independent security consultants will give a class called “Advanced ARM exploitation,” part of a broader five-day private class the duo developed. In a sold-out session, they will detail hardware hacks of multiple ARM platforms running Linux, some described on a separate blog posting.
The two software specialists got their start in hardware security work recently teaching courses in how to compromise popular embedded interfaces such as I2C and SPI. They also detailed a security flaw in a popular Broadcom cable modem chip.
The BIOS software for Intel’s x86 chips are also a target at Black Hat. A security researcher from France will show Rakshasa, a piece of malware he claims can open a “back door” on BIOS for x86 processors used on more than a hundred PC motherboards.
In another talk, Charlie Miller, a principal research consultant at Accuvant Labs, will show ways to spoof near-field communications now being designed into many smartphones. Miller will describe ways hackers can “completely take over control of the phone via NFC, including stealing photos, contacts, even sending text messages and making phone calls,” according to Black Hat proceedings.
Another security specialist will show “an experimental protocol developed to extract part of the code that runs on an embedded system” using an analysis of its power consumption. Yann Allain, founder and current director of Opale Security, will describe techniques for studying the electrical current used by an embedded system during the execution of a program to determine a sequence of opcodes and data the device uses without gaining physical access to the device.
A separate talk will show a console called FRAK for reverse engineering firmware on a HP LaserJet printer, a Cisco IP phone or router using Cisco’s IOS software. The tool enables the “disassembly, manipulation and re-assembly of [firmware] binary images,” according to the session description.
One talk will try to shock attendees by describing flaws in Onity locks used in as many as half of all hotel rooms. “We will take a look at how they are insecure by design and release a number of critical, unpatchable vulnerabilities,” the description claims.
Other sessions will describe ways to break into systems as diverse as smart meters, intrusion detection systems and cellular microcells. Three talks will detail security problems in Apple’s iOS, two will talk about vulnerabilities in Windows 8, which will not generally be available until October, and one will describe the top ten hacks for HTML 5.
I can bet of all those technical holes they are intending to showcase the star is going to be the last one- "breaking Onity locks". This is some $$ generating seminar more than on security holes of embedded cores.
Hats off for finding the problems, but their method of disclosure leaves something to be desired.
If you find a vulnerability, the first thing you should do is contact the manufacturer to allow them a chance to fix the issue before the lower-tier me-too hackers use the exploits.
Hats off to the hackers, though, running pro-active quality control on embedded products.
The techniques they use are sometimes arcane but are of course exactly the same techniques that the bad guys would use. Can companies get their ordinary engineers trained in these techniques? I can't help but think that it would pay huge dividends having at least two guys who know what the real world might throw at the company's products. Might even sort out some of the department's IT issues while they are about it.
Oh but there's balance where Rick mentions 'Intel's x86 chips'. So that's OK, then.
I despair of journalists' stereotypical behaviour, lazy abuse of their privileged positions with such potential for creative enlightenment. Nearly as bad as programmers using unsafe code or engineers leaving insufficient margins in a design...
OK, I'm having a bad month, seeing things too clearly again...
The article talks about “Advanced ARM exploitation” , then goes on to say "... they will detail hardware hacks of multiple ARM platforms running Linux,[...]".
So not ARM intrinsically then? It seems that Linux has the bigger part to play in this. Trying to implicate the ARM core in this is surely mostly FUD?
Join our online Radio Show on Friday 11th July starting at 2:00pm Eastern, when EETimes editor of all things fun and interesting, Max Maxfield, and embedded systems expert, Jack Ganssle, will debate as to just what is, and is not, and embedded system.