Home / Series / Chaos Communication Congress / Aired Order / Season 30 / Episode 126

Thwarting Evil Maid Attacks (#5600)

Speakers: Eric Michaud, Ryan Lackey Physically Unclonable Functions for Hardware Tamper Detection Increasingly, users and their computing hardware are exposed a range of software and hardware attacks, ranging from disk imaging to hardware keylogger installation and beyond. Existing methods are inadequate to fully protect users, particularly from covert physical hardware modifications in the "evil maid" scenario, and yet are very inconvenient. Victims include governments and corporations traveling internationally (e.g. China), anti-government activists in places like Syria, and anyone who is a target of a motivated attacker who can gain physical access. Physically Unclonable Functions, combined with a trusted mobile device and a network service, can be used to mitigate these risks. We present a novel open-source mobile client and network service which can protect arbitrary hardware from many forms of covert modification and attack, and which when integrated with software, firmware, and policy defenses, can provide greater protection to users and limit potential attack surface. We'll also be showing video of an unreleased tool to the public utilized by surveillance teams.

English
  • Originally Aired December 30, 2013
  • Runtime 60 minutes
  • Production Code 5600
  • Created February 1, 2015 by
    Administrator admin
  • Modified February 1, 2015 by
    Administrator admin
Name Type Role
Ryan Lackey Guest Star
Éric Michaud Guest Star