绕过安全引导在智能手机上进行激光故障注入(错误注入)

2017-11-15 14:25  下载量:2

资料摘要

资料下载

This paper describes the outcome of a laser attack study on an Android smartphone targeting specifically the secure boot sequence. Laser fault injection has become a classical attack path in the secure chip industry to investigate potential security mitigation. The implementation of such attacks on a recent mobile phone remains relatively unexplored and represents different challenges, both at hardware and software levels. In this paper, we show how the device is crafted to get a direct access to the silicon and explain the corresponding experimental setup. By inserting our own software into the boot sequence, it was possible to achieve a fine characterization of the die sensitivity to light. With the knowledge of potential perturbations, it was possible to build an attack scenario allowing to malevolently get the highest level of privilege within the mobile phone.

资料下载

文献贡献者

相关资料 更多

相关产品

当前位置: 聚擘 资料 绕过安全引导在智能手机上进行激光故障注入(错误注入)

关注

拨打电话

留言咨询