www.riscure.com Open in urlscan Pro
136.144.231.149  Public Scan

Submitted URL: https://riscure.lt.acemlnb.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZ3d3cucmlzY3VyZS5jb20lMkZibG9nJTJGc2VjdXJpdHktaG...
Effective URL: https://www.riscure.com/blog/security-highlight-glitched-on-earth-by-humans?utm_medium=email&utm_source=newsletter&vgo_e...
Submission: On October 12 via manual from CA — Scanned from CA

Form analysis 1 forms found in the DOM

GET /

<form method="get" action="/">
  <span class="search-form__label pre-title">Search</span>
  <div class="search-form__field">
    <input type="text" placeholder="I'm looking for..." name="s" class="search-form__input">
    <button type="submit" value="Search" class="search-form__submit">
      <i class="icon-search"></i>
    </button>
  </div>
</form>

Text Content

To use our site, you agree to the use of cookies and data processing according
to our privacy statement.
Close

driving your security forward

 * Get in touch
 * 

Menu
 * About Riscure
    * About Riscure
    * News
    * Events

 * Test Tools
    * All Test Tools
    * Inspector SCA
    * Inspector FI
    * True Code
    * Huracan Automotive

 * Security Services
    * Security Certification
    * Security Fitness
    * Riscure Academy
    * Secure Development Support

 * Industries
    * Automotive
    * Payment
    * Media & Multiple service operators
    * Internet of Things (IoT)
    * Semiconductor
    * All Industries

 * Knowledge Base
    * Blog
    * Publications
    * Support Portal
    * Riscure Github

 * Join Us
    * Working at Riscure
    * Careers
    * Our Team

Search

 * Home
 * Blogs
 * Security Highlight: Glitched on Earth by Humans

WRITTEN BY JASPER VAN WOUDENBERG ON 12/10/2022

Share

 * 
 * 
 * 


SECURITY HIGHLIGHT: GLITCHED ON EARTH BY HUMANS

The Black Hat conference always brings up interesting and current research
within the device security industry. Jasper van Woudenberg attended the latest
conference, where the research by Lennart Wouters caught his attention.

Lennart Wouters of COSIC studied the security of the Starlink User Terminal.
After some PCB-level reverse engineering, he found a serial port and observed
various boot loaders, U-boot, and Linux running on the device. However, there
was no obvious way to gain further access: the boot images were signed, U-boot
did not take serial input, and the development login was disabled.

These are all the standard practices to be expected from an embedded system that
has to resist logical attacks. As the title of the talk already hints at, the
question is whether it also resists fault injection attacks.

Lennart opts for voltage fault injection (VFI) first, using ChipWhisperer Lite.
This device uses the crowbar glitching technique, which momentarily shorts VCC
and ground. The downside is that it is only able to target a specific time, not
a specific location on the die. However, EMFI, laser fault, or BBI require
positioning over the chip, which presents some physical challenges for the XYZ
stage, because the PCB is very large.

With VFI, he managed to fault a shell script that determines whether a device is
in developer mode or not, giving shell access. The problem is that it had a low
success rate, and needed to fully boot (12 seconds) for each fault attempt. To
solve this, Lennart aimed the VFI at the Trusted Firmware A (TF-A) bootloader.
He found that with two glitches in BL1, he can bypass firmware signature
verification, and he could load arbitrary BL2 code.

So far, the story follows a very similar process to what we do at Riscure. Next,
Lennart took it one step further by creating Modchip – a fitted custom PCB to
inject the fault and load the attacker firmware. The Modchip can be easily
soldered to Starlink, and automates the entire FI process, giving the attacker
‘automatic root’ on their Starlink Terminal.

Another interesting note is the use of FI simulation to simulate single and
double instruction skips, based on the Unicorn Engine. This is the same approach
we utilize in Riscure FiSim. Lennart noted that although he could find double
instruction skips that caused the same effect as on the hardware, the actual
fault there was likely different. This aligns with (ongoing) Riscure internal
research, where instruction-skip simulators are compared to netlist-based
simulators.

One corollary from the research is that the TF-A BL1 is vulnerable to fault
injection. This means not only that Starlink is vulnerable, but potentially all
devices using TF-A without additional FI countermeasures. This aligns with the
TF-A documentation, which talks about FI countermeasures in software and states
“At the moment TF-A doesn’t implement such mitigations.” Interestingly, for TF-M
there is some ongoing work in hardening against FI. You can learn more about
this work here.

For more information on how to implement (software) countermeasures yourself,
more information can be found in our whitepaper Secure Application Programming
in the presence of Side Channel attacks, or contact Riscure at
inforequest@riscure.com for countermeasure validation.



FOLLOW US

 * 
 * 
 * 

Riscure Head Office

+31 (0)15 251 4090 (9:00 – 17:00 CET)
inforequest@riscure.com

Delftechpark 49
2628 XJ Delft
The Netherlands

Chamber of Commerce: 27287509
VAT: NL815984753B01

Resellers | Support portal

Riscure North America

+1 (650) 646 9979
inforequest-na@riscure.com

550 Kearny St.
Suite 330
San Francisco, CA 94108
USA

Riscure China

+86 21 5117 5435
inforcn@riscure.com

Room 2030-31
No. 989, Changle Road
Shanghai 200031
China

 

© Riscure. All rights reserved.