Download presentation
Presentation is loading. Please wait.
Published byTyrone Williamson Modified over 8 years ago
1
Twesige Richard
2
Advanced RISC Machines. Set of instruction set architectures related to programing registers, CPU’s also I/O devices. RISC acronym for ‘ Reduced Instruction Set Computing ‘
3
ARM technology is prevalent in cell phones and micro-controllers. Focusing on Cell Phone technology; - Cell phones have became a big advancement in turn they have become “more trusted” than the Desktop PC/Laptop. - BIGGER the number = BIGGER targets.
4
How many services are running? There weaknesses have been hard to exploit. With more Shell codes, exploitation is simple. Shell code, is a small piece of code used as a payload in exploitation of software vulnerability.
5
This shell code above can open port 4444 on a local Linux operating machine. It ties a Bourne shell to it with root privileges. It could be Sent through email.
6
Software vulnerabilities? There has been significant improvement. - Patches. - Updates. - Bug fixes.
7
How about the hardware? For we know; - Links are complete when two physical layers of Transfer Control Protocol are connected. More attractive area of attack since; - There is lack of secure hardware development knowledge. - No hardware “patching.”
8
The City of San Francisco contains approximately 23,000 “smart” electronic parking meters manufactured by MacKay. That boast tamper resistance, payment via smartcard, and usage auditing capabilities. Evaluated San Francisco’s electronic parking meter implementation, was installed at a cost of $35 million. Keep in mind these meters are ARM.
9
Equipped with; - a stored value smartcard. These non- refillable, disposable cards can be purchased online. - A smart-card reader/writer. - Smart-card emulator.
12
Now with most Cell Phones always roaming and staying connected to WIFi, there is a high chance of an attack happening right now. With big companies like Lenovo having hardware manufactured in China; - Wouldn’t it be easy to install a 21 Century backdoor?
13
Sometimes when your phone freezes, its not a glitch. Caused by; - Trojan Horse in the complex circuitry. - A bug in chip code waiting to be triggered.
14
There is an easy access to tools, manufactures guide, information about a particular hardware, hobbyist who are interested in electronics. This has made ARM and hardware hacking possible. Attackers are have gained more access to the above. I will conclude by stating that with the growing concern that an attacker control critical hardware systems such as electrical generation and traffic management systems. Hacking through real-world examples and frequently used electronic devices is a crucial thing to learn in order for us to design better products that will pave a way for even greater technology.
15
http://arstechnica.com/gadgets/2008/05/risc-vs-cisc- mobile-era http://arstechnica.com/gadgets/2008/05/risc-vs-cisc- mobile-era http://www.onlamp.com/pub/a/linux/2006/05/18/how- shellcodes-work.html http://www.onlamp.com/pub/a/linux/2006/05/18/how- shellcodes-work.html http://www.pcworld.com/article/188632/Is_Chinese_PC_H ardware_Safe_and_Secure.html http://www.pcworld.com/article/188632/Is_Chinese_PC_H ardware_Safe_and_Secure.html http://www.scientificamerican.com/article.cfm?id=the- hacker-in-your-hardware http://www.scientificamerican.com/article.cfm?id=the- hacker-in-your-hardware http://grandideastudio.com/wp- content/uploads/hacks_and_attacks_paper.pdf http://grandideastudio.com/wp- content/uploads/hacks_and_attacks_paper.pdf
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.