I gave a talk 
about robots 
and hardware! 
A story of Research by: ! 
Josh “m0nk” Thomas / @m0nk_dot! 
44CON 2014
this hour, your talking head is… 
✤ Josh “m0nk” Thomas! 
✤ @m0nk_dot ! 
✤ Partner and Chief Breaking Officer @ Atredis Partners! 
✤ Recovering software developer (AI / Crypto / Mobile “stuff”)! 
✤ Atredis Partners! 
✤ Focused and targeted security firm! 
✤ Specializing in advanced hardware and software assessments! 
✤ Mobile and embedded systems! 
✤ Societal infrastructure! 
✤ Black boxes! 
✤ Advanced malware and rootkit analysis! 
✤ Handcrafted artisanal and deep bespoke research
@m0nk_dot likes to put 
trite commentary in 
front of pretty pictures
story arc 
✤ preface[0] = “Tongue Tied by many nights of NDA curiosity”! 
✤ preface[1] = “What is the point / Where is the squishy?”! 
✤ history lesson [0] = “The story of Wang and the Bed”! 
✤ story[0] = “Hardware Design”! 
✤ story[1] = “Iteration”! 
✤ story [2] = “SoC, Bootloaders and trust chains”
I haz NDA? 
✤ I hate this, but it is sadly worth mentioning! 
✤ … and you thought open source licenses were annoying! 
✤ Words I can say:! 
✤ Sony! 
✤ HTC! 
✤ LG! 
✤ I can sometimes say the words:! 
✤ Nokia! 
✤ Qualcomm! 
✤ BlackBerry! 
✤ Words I cannot say:
Why to care?
Why Hit 
Hardware? 
✤ Hard to get Code Exec / 
Control! 
✤ Forensic OS Dumps! 
✤ Crypto Keys & Boot Settings 
What to look 
for? 
✤ JTAG & Debug Access! 
✤ Direct NAND Access! 
✤ Bootloader Access & 
Manipulation
Functionality aside, why is 
hardware interesting 
✤ Pretty! 
✤ It is just as raw as source code, ASM or IDA! 
✤ A concrete example of how much a company cares / what level of 
effort should be expected to break it! 
✤ Not normally “patchable” / LOOOOOOOONG shelf life
history lesson [0]: could be true? 
The story of Wang and the Bed 
…had a kid, scada-curious, , talked about StuxNet, met at the pub… 
proof that I am not a EE and that some people are just damn cool
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
story[0] 
All hardware has a story to tell 
stick with me here… I promise the following 
has a point and is more that “vacation pics”
What Simple Looks Like: 
MasterLock dialSpeed
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
What Complex Looks Like: 
Microsoft Xbox 360
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Traces I Love: 
Samsung ChromeBook (Daisy)
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Ol’ Grand Dad: 
Qualcomm Dragon Board
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
The Godfather Phone: 
Qualcomm Snapdragon 8974 Dev Platform
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
One Sided Conversation / Traces I Hate: 
Motorola Moto X
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Grumble Grumble RF Shields: 
BlackBerry Z30
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Hidden for a Reason: 
HTC One
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Advanced Game: 
Apple iPhone 5S
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
XXX: 
BlackBerry Z10
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
XXX: 
Nokia Lumia 635
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Speaking of… 
Microsoft Surface RT (V1)
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Squares and NAND: 
Sony Arc S
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Squares and Burner: 
Sony Xperia Z
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
XXX: 
LG Nexus 5
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Old School: 
LG Nexus 4
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Not a Monster: 
Samsung Galaxy Note 3
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Oddly Normal: 
Samsung Galaxy 4
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Lessons Learned 
✤ Motorola tends to make one sided boards that are very simple and 
masked! 
✤ Samsung likes uber dense complexity and non-euclidean shapes! 
✤ Sony is just kinda boring and square! 
✤ BlackBerry and Nokia internals look oddly identical! 
✤ No one is a dense as Apple! 
✤ Microsoft should QA a bit more! 
✤ The new style is to hide Qualcomm below the NAND
story[1] 
Background Complete: 
Exploring Iterative Design with Amazon Prime
Catching Fire - An Evolution 
✤ Amazon has released 7 iterations of the Kindle Fire platform since late 2011:! 
✤ Kindle Fire (1st Generation - 11/15/2011)! 
✤ Kindle Fire (2nd Generation - 09/14/2012)! 
✤ Kindle Fire HD 7" (1st Generation - 09/14/2012)! 
✤ Kindle Fire HD 8.9" (1st Generation - 11/20/2012) (also has a cellular variant)! 
✤ Kindle Fire HD 7" (2nd Generation - 10/02/2013)! 
✤ Kindle Fire HDX 7" (3rd Generation - 10/18/2013) (also has a cellular variant)! 
✤ Kindle Fire HDX 8.9" (3rd Generation - 11/07/2013) (also has a cellular variant)! 
✤ Fire Phone (released 07/25/2014).
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Amazon Fire V1
Amazon Fire V2
Amazon Fire V1
Amazon Fire V2
Amazon Fire HD V1
Amazon Fire HD V2
Amazon Fire HDX V1
Amazon Fire HDX V1
story[2]: 
SoC, Bootloaders and trust chains
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
TEE on the MSM8960 SoC 
✤ Hosts a collection of Trusted Execution Environments! 
✤ Krait Core 0 (Trust Zone)! 
✤ The ARM7 based RPM (Resource and Power Management System)! 
✤ The Modem System (assume this is the Hexagon Baseband 
platform)! 
✤ The SPS (Smart Peripheral System)
Hardware of Note 
✤ eFuses / QFPROM hold a lot of data (covered later)! 
✤ The SoC reuses the ARM7 and ARM9 cores for different functions 
depending on the current processing needs! 
✤ Hardware hosts 2 discrete “Crypto Engine” processors in hardware! 
✤ CE1 is hardware latched to fuses for the the Primary Hardware Key ! 
✤ CE2 is hardware latched to fuses for the User Hardware Key! 
✤ Assumed to be the ARM9 cores
A Glance at the Boot Chain before 
the “Bootloader”
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
The Secure Boot 3.0 Process 
Interesting tidbits 
✤ RPM PBL starts executing at physical address 0x00! 
✤ Multitude of Bootloader options here specifying where to look for 
more code to execute! 
✤ All Authentication pre TZ load uses the Crypto Engine 1 (CE1) & the 
Primary Hardware Key (PHK) from the eFuse block! 
✤ (Supposedly) Debuggable via “proprietary” tools! 
✤ Highly eFuse controlled! 
✤ Supports an “Emergency Download Mode” upon crash
Things are getting fused
How Fuses Work 
✤ Total of 16kb block of eFuses / QFPROM on MSM8960! 
✤ 4kb mapped and easily accessible:! 
✤ QFPROM BASE PHYSICAL: 0x00700000! 
✤ QFPROM SHADOW BASE: 0x00706000! 
✤ Can be read whenever / Written Once! 
✤ To write, need to hold voltage for $TIME_PERIOD
44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas
Interesting QFPROM 
✤ A 256-bit Primary Hardware Key (PHK used by CE1)! 
✤ A 256-bit Secondary Hardware Key (SHK used by CE2)! 
✤ A 128-bit OEM Customer key! 
✤ A 2048-bit Customer private key! 
✤ Fuses to disable debug / JTAG! 
✤ Fuses to reenable debug / JTAG! 
✤ Possible large swaths of unmapped free space
<insert POC||GTFO source here>
There is no conclusion, only Zuul 
thanks for letting me talk… 
any questions?

More Related Content

PDF
Controlling USB Flash Drive Controllers: Expose of Hidden Features
PPTX
DerbyCon 2014 - Making BadUSB Work For You
PPTX
Android
KEY
2012 11-01 Hackers & founders - Boot to the web, boot 2 gecko / Firefox OS
PPT
Android ppt
PPTX
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
PPTX
44CON @ IPexpo - You're fighting an APT with what exactly?
PDF
44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley
Controlling USB Flash Drive Controllers: Expose of Hidden Features
DerbyCon 2014 - Making BadUSB Work For You
Android
2012 11-01 Hackers & founders - Boot to the web, boot 2 gecko / Firefox OS
Android ppt
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON 2104 - Lessons Learned from Black Hat's Infrastructure, Conan Dooley

Viewers also liked (20)

PPTX
44CON 2014 - Researching Android Device Security with the Help of a Droid Arm...
PDF
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
PPTX
44CON 2013 - .Net Havoc - Manipulating Properties of Dormant Server Side Web ...
PDF
44CON 2014 - Breaking AV Software
PDF
44CON 2014 - Flushing Away Preconceptions of Risk, Thom Langford
PDF
44CON London 2015 - reverse reverse engineering
PDF
44CON London 2015 - Hunting Asynchronous Vulnerabilities
PDF
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
PDF
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
PDF
44CON 2014 - Advanced Excel Hacking, Didier Stevens
PDF
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
PDF
44CON London 2015 - Playing with Fire: Attacking the FireEye MPS
PDF
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
PDF
44CON 2014 - GreedyBTS: Hacking Adventures in GSM, Hacker Fantastic
PDF
44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...
PDF
44CON London 2015 - Inside Terracotta VPN
PDF
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
PDF
44CON 2014 - Binary Protocol Analysis with CANAPE, James Forshaw
PDF
44CON London - Attacking VxWorks: from Stone Age to Interstellar
PDF
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON 2014 - Researching Android Device Security with the Help of a Droid Arm...
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON 2013 - .Net Havoc - Manipulating Properties of Dormant Server Side Web ...
44CON 2014 - Breaking AV Software
44CON 2014 - Flushing Away Preconceptions of Risk, Thom Langford
44CON London 2015 - reverse reverse engineering
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON 2014 - Advanced Excel Hacking, Didier Stevens
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
44CON London 2015 - Playing with Fire: Attacking the FireEye MPS
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
44CON 2014 - GreedyBTS: Hacking Adventures in GSM, Hacker Fantastic
44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...
44CON London 2015 - Inside Terracotta VPN
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
44CON 2014 - Binary Protocol Analysis with CANAPE, James Forshaw
44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
Ad

Similar to 44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas (20)

PPTX
Reverse Engineering the TomTom Runner pt. 1
PDF
Reverse engineering
PPT
Gadgets as Personal Productivity Tools - My Story
PDF
Feasibility of Security in Micro-Controllers
PDF
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...
PDF
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
PDF
PHP Barcelona Monthly Talk Feb 2015
PDF
Stronger than its Weakest Link
PDF
The dangers of black box devices.
PPTX
Hacker's and painters Hardware Hacking 101 - 10th Oct 2014
PDF
Behind The Code // by Exness
PDF
Don't Give Credit: Hacking Arcade Machines
PDF
Stegano Forensics
PDF
Learning by hacking - android application hacking tutorial
PPT
nodebots presentation @seekjobs
PDF
Java tuning on GNU/Linux for busy dev
PDF
Tools Of The Hardware Hacking Trade Final
PPTX
Advanced SOHO Router Exploitation XCON
KEY
DjangoSki
PPTX
28c3 in 15
Reverse Engineering the TomTom Runner pt. 1
Reverse engineering
Gadgets as Personal Productivity Tools - My Story
Feasibility of Security in Micro-Controllers
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
PHP Barcelona Monthly Talk Feb 2015
Stronger than its Weakest Link
The dangers of black box devices.
Hacker's and painters Hardware Hacking 101 - 10th Oct 2014
Behind The Code // by Exness
Don't Give Credit: Hacking Arcade Machines
Stegano Forensics
Learning by hacking - android application hacking tutorial
nodebots presentation @seekjobs
Java tuning on GNU/Linux for busy dev
Tools Of The Hardware Hacking Trade Final
Advanced SOHO Router Exploitation XCON
DjangoSki
28c3 in 15
Ad

More from 44CON (18)

ODP
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
PPTX
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
PPTX
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
PDF
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
PDF
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
PDF
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
PDF
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
PDF
Pwning the 44CON Nerf Tank
PDF
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
PDF
44CON London 2015 - Is there an EFI monster inside your apple?
PPTX
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
PPTX
44CON London 2015 - How to drive a malware analyst crazy
PDF
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
PDF
44CON London 2015 - Going AUTH the Rails on a Crazy Train
PDF
44CON London 2015 - Software Defined Networking (SDN) Security
PDF
44CON London 2015 - DDoS mitigation EPIC FAIL collection
PDF
44CON London 2015 - Windows 10: 2 Steps Forward, 1 Step Back
PPTX
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Pwning the 44CON Nerf Tank
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - Windows 10: 2 Steps Forward, 1 Step Back
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell

Recently uploaded (20)

PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Architecture types and enterprise applications.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Getting Started with Data Integration: FME Form 101
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
A comparative study of natural language inference in Swahili using monolingua...
Architecture types and enterprise applications.pdf
Developing a website for English-speaking practice to English as a foreign la...
Assigned Numbers - 2025 - Bluetooth® Document
Web Crawler for Trend Tracking Gen Z Insights.pptx
O2C Customer Invoices to Receipt V15A.pptx
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Zenith AI: Advanced Artificial Intelligence
DP Operators-handbook-extract for the Mautical Institute
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
WOOl fibre morphology and structure.pdf for textiles
Getting Started with Data Integration: FME Form 101
sustainability-14-14877-v2.pddhzftheheeeee
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Getting started with AI Agents and Multi-Agent Systems
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Hybrid model detection and classification of lung cancer
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Hindi spoken digit analysis for native and non-native speakers

44CON 2014 - I gave a talk about robots and hardware!, Josh Thomas

  • 1. I gave a talk about robots and hardware! A story of Research by: ! Josh “m0nk” Thomas / @m0nk_dot! 44CON 2014
  • 2. this hour, your talking head is… ✤ Josh “m0nk” Thomas! ✤ @m0nk_dot ! ✤ Partner and Chief Breaking Officer @ Atredis Partners! ✤ Recovering software developer (AI / Crypto / Mobile “stuff”)! ✤ Atredis Partners! ✤ Focused and targeted security firm! ✤ Specializing in advanced hardware and software assessments! ✤ Mobile and embedded systems! ✤ Societal infrastructure! ✤ Black boxes! ✤ Advanced malware and rootkit analysis! ✤ Handcrafted artisanal and deep bespoke research
  • 3. @m0nk_dot likes to put trite commentary in front of pretty pictures
  • 4. story arc ✤ preface[0] = “Tongue Tied by many nights of NDA curiosity”! ✤ preface[1] = “What is the point / Where is the squishy?”! ✤ history lesson [0] = “The story of Wang and the Bed”! ✤ story[0] = “Hardware Design”! ✤ story[1] = “Iteration”! ✤ story [2] = “SoC, Bootloaders and trust chains”
  • 5. I haz NDA? ✤ I hate this, but it is sadly worth mentioning! ✤ … and you thought open source licenses were annoying! ✤ Words I can say:! ✤ Sony! ✤ HTC! ✤ LG! ✤ I can sometimes say the words:! ✤ Nokia! ✤ Qualcomm! ✤ BlackBerry! ✤ Words I cannot say:
  • 7. Why Hit Hardware? ✤ Hard to get Code Exec / Control! ✤ Forensic OS Dumps! ✤ Crypto Keys & Boot Settings What to look for? ✤ JTAG & Debug Access! ✤ Direct NAND Access! ✤ Bootloader Access & Manipulation
  • 8. Functionality aside, why is hardware interesting ✤ Pretty! ✤ It is just as raw as source code, ASM or IDA! ✤ A concrete example of how much a company cares / what level of effort should be expected to break it! ✤ Not normally “patchable” / LOOOOOOOONG shelf life
  • 9. history lesson [0]: could be true? The story of Wang and the Bed …had a kid, scada-curious, , talked about StuxNet, met at the pub… proof that I am not a EE and that some people are just damn cool
  • 12. story[0] All hardware has a story to tell stick with me here… I promise the following has a point and is more that “vacation pics”
  • 13. What Simple Looks Like: MasterLock dialSpeed
  • 15. What Complex Looks Like: Microsoft Xbox 360
  • 17. Traces I Love: Samsung ChromeBook (Daisy)
  • 19. Ol’ Grand Dad: Qualcomm Dragon Board
  • 21. The Godfather Phone: Qualcomm Snapdragon 8974 Dev Platform
  • 27. One Sided Conversation / Traces I Hate: Motorola Moto X
  • 30. Grumble Grumble RF Shields: BlackBerry Z30
  • 34. Hidden for a Reason: HTC One
  • 37. Advanced Game: Apple iPhone 5S
  • 49. Speaking of… Microsoft Surface RT (V1)
  • 53. Squares and NAND: Sony Arc S
  • 56. Squares and Burner: Sony Xperia Z
  • 65. Old School: LG Nexus 4
  • 68. Not a Monster: Samsung Galaxy Note 3
  • 75. Lessons Learned ✤ Motorola tends to make one sided boards that are very simple and masked! ✤ Samsung likes uber dense complexity and non-euclidean shapes! ✤ Sony is just kinda boring and square! ✤ BlackBerry and Nokia internals look oddly identical! ✤ No one is a dense as Apple! ✤ Microsoft should QA a bit more! ✤ The new style is to hide Qualcomm below the NAND
  • 76. story[1] Background Complete: Exploring Iterative Design with Amazon Prime
  • 77. Catching Fire - An Evolution ✤ Amazon has released 7 iterations of the Kindle Fire platform since late 2011:! ✤ Kindle Fire (1st Generation - 11/15/2011)! ✤ Kindle Fire (2nd Generation - 09/14/2012)! ✤ Kindle Fire HD 7" (1st Generation - 09/14/2012)! ✤ Kindle Fire HD 8.9" (1st Generation - 11/20/2012) (also has a cellular variant)! ✤ Kindle Fire HD 7" (2nd Generation - 10/02/2013)! ✤ Kindle Fire HDX 7" (3rd Generation - 10/18/2013) (also has a cellular variant)! ✤ Kindle Fire HDX 8.9" (3rd Generation - 11/07/2013) (also has a cellular variant)! ✤ Fire Phone (released 07/25/2014).
  • 89. story[2]: SoC, Bootloaders and trust chains
  • 91. TEE on the MSM8960 SoC ✤ Hosts a collection of Trusted Execution Environments! ✤ Krait Core 0 (Trust Zone)! ✤ The ARM7 based RPM (Resource and Power Management System)! ✤ The Modem System (assume this is the Hexagon Baseband platform)! ✤ The SPS (Smart Peripheral System)
  • 92. Hardware of Note ✤ eFuses / QFPROM hold a lot of data (covered later)! ✤ The SoC reuses the ARM7 and ARM9 cores for different functions depending on the current processing needs! ✤ Hardware hosts 2 discrete “Crypto Engine” processors in hardware! ✤ CE1 is hardware latched to fuses for the the Primary Hardware Key ! ✤ CE2 is hardware latched to fuses for the User Hardware Key! ✤ Assumed to be the ARM9 cores
  • 93. A Glance at the Boot Chain before the “Bootloader”
  • 95. The Secure Boot 3.0 Process Interesting tidbits ✤ RPM PBL starts executing at physical address 0x00! ✤ Multitude of Bootloader options here specifying where to look for more code to execute! ✤ All Authentication pre TZ load uses the Crypto Engine 1 (CE1) & the Primary Hardware Key (PHK) from the eFuse block! ✤ (Supposedly) Debuggable via “proprietary” tools! ✤ Highly eFuse controlled! ✤ Supports an “Emergency Download Mode” upon crash
  • 97. How Fuses Work ✤ Total of 16kb block of eFuses / QFPROM on MSM8960! ✤ 4kb mapped and easily accessible:! ✤ QFPROM BASE PHYSICAL: 0x00700000! ✤ QFPROM SHADOW BASE: 0x00706000! ✤ Can be read whenever / Written Once! ✤ To write, need to hold voltage for $TIME_PERIOD
  • 99. Interesting QFPROM ✤ A 256-bit Primary Hardware Key (PHK used by CE1)! ✤ A 256-bit Secondary Hardware Key (SHK used by CE2)! ✤ A 128-bit OEM Customer key! ✤ A 2048-bit Customer private key! ✤ Fuses to disable debug / JTAG! ✤ Fuses to reenable debug / JTAG! ✤ Possible large swaths of unmapped free space
  • 101. There is no conclusion, only Zuul thanks for letting me talk… any questions?