logo

Bam the BAM - Electromagnetic Fault Injection & Automotive Systems

Conference:  BlackHat USA 2021

2021-08-05

Summary

The presentation discusses fault injection attacks on microcontrollers and how they can be used to bypass security measures such as password protection. The speaker demonstrates the effectiveness of electromagnetic fault injection on an off-the-shelf development board and an ECU from a car.
  • The presentation explains how fault injection attacks work on microcontrollers
  • The speaker demonstrates the use of electromagnetic fault injection on an off-the-shelf development board and an ECU from a car
  • The effectiveness of the attack is demonstrated by bypassing password protection on the microcontroller
  • The presentation provides resources for those interested in learning more about fault injection and related topics
The speaker demonstrates the effectiveness of electromagnetic fault injection on a Trezor wallet and receives a bitcoin as a reward from the company for disclosing the vulnerability

Abstract

This talk introduces an example of how electromagnetic fault injection (EMFI) can be used to bypass security used to prevent ECU modifications on a recent (tested on a 2019 model year) automotive ECU. This attack requires extensive physical access to the ECU, but does not require modifications to the ECU. It's sufficient to simply open the ECU to expose the main microcontroller, which allows the fault injection attack to succeed.This talk further shows how you can perform such validation yourself on other devices - using tools such as power analysis to determine if there are potentially vulnerable locations, and using fault injection to try and validate the vulnerabilities. This also allows you to experiment with ways of improving the resilience of a given device in case you are already using it somewhere critical - here an example will be given of several configurations which are more resilient to EMFI attacks.

Materials:

Tags: