We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Side channel attacks on high security electronic safe locks

00:00

Formal Metadata

Title
Side channel attacks on high security electronic safe locks
Title of Series
Number of Parts
93
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Electronic locks are becoming increasingly common on consumer-grade safes, particularly those used to secure guns. This talk explores vulnerabilities of several UL-listed Type 1 "High Security" electronic safe locks. Using side-channel attacks, we recover the owner-configured keycodes on two models of these locks from outside of locked safes without any damage to the locks or safes. Discussion includes power-line analysis, timing attacks, and lockout-defeat strategies on embedded devices. Bio: An embedded software developer with a background in electrical engineering, Plore has long been fascinated by computer security and locks. One day he found himself wondering if the trust bestowed on electronic locks was actually misplaced. He decided to investigate.
TelecommunicationInformation securityRight angleLecture/ConferenceComputer animation
ComputerTelecommunicationData typeInformation securityType theoryTelecommunicationType theoryContext awarenessInformation securityElectronic mailing listBitMultiplication signComputer animation
Bit
Physical systemData modelLogicMicrocontrollerVoltmeterComputer animation
EEPROMVoltmeterDigital electronicsData modelMultiplication signSingle-precision floating-point formatDrop (liquid)State of matterLine (geometry)Mathematical analysisMicrocontrollerOcean currentSide channel attackBus (computing)Power (physics)Reading (process)Bit rateComputer animation
Numerical digitEEPROMMathematical analysisPower (physics)Line (geometry)EEPROMReal-time operating systemBitState of matterPosition operatorComputer animation
Demo (music)VideoconferencingDemo (music)CodeWordComputer animationXML
Keilförmige AnordnungCodeWordData storage deviceKey (cryptography)BitDiagramComputer animation
DigitizingWordGreatest elementOcean currentTouchscreenCodeArrow of timeComputer animation
Demo (music)CodeDigitizingMicrocontrollerPairwise comparisonEEPROMPivot elementScanning tunneling microscopeFamilyMereologyBlock (periodic table)Loop (music)Connectivity (graph theory)Multiplication signBitDifferent (Kate Ryan album)Flow separationEPROMComputer animation
Numerical digitPairwise comparisonEEPROMIterationLarge eddy simulationDifferent (Kate Ryan album)SpacetimeDigitizingMultiplication signCodeComputer animation
2 (number)Matching (graph theory)Multiplication signMathematical analysisPower (physics)CodeKey (cryptography)Different (Kate Ryan album)DigitizingPoint (geometry)
CodeCycle (graph theory)Multiplication signDigitizingCodeRight angleBitProgram flowchart
Numerical digitDigitizingMultiplication signRevision controlSequenceSeries (mathematics)2 (number)Real numberComputer animation
EEPROMPower (physics)Programmable read-only memoryMultiplication signFirmwareCodeRight angleScanning tunneling microscopeRow (database)Address spaceCountingFilm editingMicrocontrollerFlash memoryEPROMComputer animation
Computer configurationEEPROMInterrupt <Informatik>MereologyCycle (graph theory)Power (physics)Multiplication signRight angleFilm editingWritingProduct (business)CountingKey (cryptography)Diagram
EEPROMComputer configurationInterrupt <Informatik>CountingDigitizingForcing (mathematics)InfinityCodeNumberKey (cryptography)Computer animation
Power (physics)Control flowSimulationHacker (term)EmulatorFilm editingSocial classMultiplication signQuicksortMetrePower (physics)WhiteboardControl systemMechanism designAlgorithmComputer animation
Numerical digitSample (statistics)2 (number)DigitizingCountingForcing (mathematics)AlgorithmMultiplication signFrequencyComputer animation
Demo (music)Forcing (mathematics)Cycle (graph theory)FirmwareIntegrated development environmentCombinational logicVector potentialMultiplicationFlash memoryLine (geometry)Multiplication signCodeDigitizingVideoconferencingGreen's functionDivisorWhiteboardThumbnailPresentation of a group2 (number)Sound effectArmPoint (geometry)Real numberXML
System programmingPower (physics)Mathematical analysisEEPROMLarge eddy simulationMechanism designData storage devicePhysical systemSoftwareCartesian coordinate systemQuicksortComputer hardwareCodeKey (cryptography)Computer animation
Loop (music)CountingLogical constantError messageMultiplication signFlash memoryDependent and independent variablesData storage deviceQuicksortPairwise comparisonStandard deviationCodeGoodness of fitMechanism designLecture/Conference
Transcript: English(auto-generated)