PodParley PodParley

Cracking the MSP430 BSL (25c3)

Part Two

An episode of the Chaos Computer Club - 25C3: nothing to hide (ogg) podcast, hosted by Travis Goodspeed, titled "Cracking the MSP430 BSL (25c3)" was published on December 27, 2008 and runs 37 minutes.

December 27, 2008 ·37m · Chaos Computer Club - 25C3: nothing to hide (ogg)

0:00 / 0:00

The Texas Instruments MSP430 low-power microcontroller is used in many medical, industrial, and consumer devices. When its JTAG fuse is blown, the device's firmware is kept private only a serial bootstrap loader (BSL), certain revisions of which are vulnerable to a side-channel timing analysis attack. This talk continues that from Black Hat USA by describing the speaker's adventures in creating a hardware device for exploiting this vulnerability. about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2839.en.html

The Texas Instruments MSP430 low-power microcontroller is used in many medical, industrial, and consumer devices. When its JTAG fuse is blown, the device's firmware is kept private only a serial bootstrap loader (BSL), certain revisions of which are vulnerable to a side-channel timing analysis attack. This talk continues that from Black Hat USA by describing the speaker's adventures in creating a hardware device for exploiting this vulnerability. about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2839.en.html
URL copied to clipboard!