The presentation discusses the impact of FPGA bitstream manipulation on various devices, including Cisco routers and switches, advanced driver assistant cars, and legacy weapon systems. The speaker presents a tool called Brian that can unpack, analyze, modify, and repack firmware. The tool can also perform side channel analysis and fault injection to bypass security checks. The speaker also discusses the vulnerability named Three Angry Cat, which is the first vulnerability named after three unpronounceable emojis. The vulnerability affects the domain name and can be exploited to gain access to the firmware. The speaker provides a visualization tool that can pinpoint the exact location of resources in the binary and disable specific pins to prevent the trust anchor from resetting the processor.
- FPGA bitstream manipulation can impact various devices, including Cisco routers and switches, advanced driver assistant cars, and legacy weapon systems
- The tool called Brian can unpack, analyze, modify, and repack firmware
- The tool can perform side channel analysis and fault injection to bypass security checks
- The vulnerability named Three Angry Cat affects the domain name and can be exploited to gain access to the firmware
- A visualization tool can pinpoint the exact location of resources in the binary and disable specific pins to prevent the trust anchor from resetting the processor
The speaker discusses the vulnerability named Three Angry Cat, which is the first vulnerability named after three unpronounceable emojis. The vulnerability affects the domain name and can be exploited to gain access to the firmware. The speaker provides a visualization tool that can pinpoint the exact location of resources in the binary and disable specific pins to prevent the trust anchor from resetting the processor.