SlideShare a Scribd company logo
Defense-in-Depth
for
Embedded Devices
Jiggyasu Sharma
DISCLAIMER
The opinions and thoughts presented during the course
of this presentation are my own and do not reflect the
views or positions of my employer.
2
#whoami
• A security evangelist
• Working with Resideo (Honeywell Homes) – Product Security
• Contributor towards security communities; IS-RA, null, CysInfo,
h1hakz, ISC2.
• Speaker at security conferences RSA, c0c0n, IoT day etc.
• Having security certifications from Offensive Security, SANS and EC-
Council
• Interested in IoT, ICS and SCADA Security
3
Agenda
• To know about embedded devices attack surface
• And to protect them against hack
How is Embedded Device look like?
Embedded Device Stack
• Attack Vectors
• Device reconnaissance
• Web Search Engines
• FCCID
• Open Source Libraries
• Tempering the Device
• Chip/components Identification
• Datasheets
• Pin-out Probes
Hardware Components
Hardware Protocols
Boot/RootFS
Application/Platform
Kernel
Bootloader / Firmware
• Countermeasures
• To protect the device IP
• Service/User Manuals
• Test Documents on FCCID
• Securing Open source Libraries
• Chip morphing
• Temper Protection
Embedded Device Stack
• Attack Vectors
• JTAG
• UART
• SPI
• I2C
• CANBUS
• BDS
Hardware Components
Hardware Protocols
Boot/RootFS
Kernel
Bootloader / Firmware
Application/Platform • Countermeasures
• Obfuscation of pin-outs
• Remove the Traces
• Blow Fuse in Pin-Outs
• Encryption/Authentication
• Key Token
• Power Toggle
• Read out Protections
• Randomizing Probes
• Set option Bits
• Validating Assembly
• CRC/ HASH
• Custom Baud Rate
Embedded Device Stack
• Attack Vectors
• U-Boot
• RootFS
• Firmware Signature
• Root Certificates
Hardware Components
Hardware Protocols
Boot/RootFS
Kernel
Bootloader / Firmware
Application/Platform • Countermeasures
• Run Time key Generation
• Safe Zones
• Using Secondary memory
• Secure Boot enable
• Authenticated RootFS
• Obfuscated Signatures
Embedded Device Stack
• Attack Vectors
• Memory Leakage
• Stack overflow
• Buffer Overflow
• Unmanaged code
• Kernel Crash
• Unhandled exception
• Side Channels Faults
• Power glitching
• NAND/Clock glitching
• ThermalHardware Components
Hardware Protocols
Boot/RootFS
Kernel
Bootloader / Firmware
Application/Platform
• Countermeasures
• Memory management
• Exception handling
• Fixing Zero days
• Crash reporting/Self Healing
• Circuit Power Handling
• Glitch detectors
• Brownout detectors
• Lockstep cores
• Asynchronous internal clock with
dummy cycles
• Internal Oscillators
• Halt on invalid instruction execution
• Lock down unnecessary diagnostic
signals
• Mutable codes
Embedded Device Stack
• Attack Vectors
• Firmware Emulation
• Reverse Engineering
• Compression/Encryption
• Hardcoded Credentials/Keys/Certificates
• PII
• Key Generation Algo
• Backdoors
Hardware Components
Hardware Protocols
Boot/RootFS
Kernel
Bootloader / Firmware
Application/Platform
• Countermeasures
• Encryption
• Compression
• Obfuscation
• Encoding
• Certificates
• Signatures
• Run time Keys
• Run time protection
• Remove Backdoors
• Randomized functions
• Secure APIs/Libraries
• Integral Updates
• Complex key generations
• Root of trust / Chain of Trust
• Avoid Secondary memory
Embedded Device Stack
• Attack Vectors
• Application Flaws
• COAP
• MQTT
Hardware Components
Hardware Protocols
Boot/RootFS
Kernel
Bootloader / Firmware
Application/Platform • Countermeasures
• Secure API implementation
• Auth Mechanism
• Reliable node detection
• Active search engine scans
• Secure 3rd party libraries
• TLS
Take Away
Questions???
Connect to me:
/jiggyasu-sharma
/jiggyasu.sharma
/jiggyasu_sharma
jiggyasu.sharma@gmail.com
13
Thank you धन्यवाद्

More Related Content

PPTX
Firmware analysis 101
PDF
Beginners guide on how to start exploring IoT 2nd session
PDF
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
PDF
Maemo 6 Platform Security
PPTX
Hardware Security Training By TONEX
PPTX
Practical Security Assessments of IoT Devices and Systems
PPTX
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
PDF
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
Firmware analysis 101
Beginners guide on how to start exploring IoT 2nd session
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
Maemo 6 Platform Security
Hardware Security Training By TONEX
Practical Security Assessments of IoT Devices and Systems
Pwning Iot via Hardware Attacks - Chase Schultz - IoT Village - Defcon 23
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...

What's hot (12)

PDF
Malware cryptomining uploadv3
PDF
Aes jul-upload
PDF
Using fault injection attacks for digital forensics
PPTX
Practical hardware attacks against SOHO Routers & the Internet of Things
PDF
IoT security zigbee -- Null Meet bangalore
PDF
FIWARE Tech Summit - TST Connected Solutions Using FIWARE
DOCX
kali linix
PPT
iOS Application Pentesting
PDF
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
PPTX
Introduction to epid
PDF
Top 10 secure boot mistakes
Malware cryptomining uploadv3
Aes jul-upload
Using fault injection attacks for digital forensics
Practical hardware attacks against SOHO Routers & the Internet of Things
IoT security zigbee -- Null Meet bangalore
FIWARE Tech Summit - TST Connected Solutions Using FIWARE
kali linix
iOS Application Pentesting
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Introduction to epid
Top 10 secure boot mistakes
Ad

Similar to Defense-in-depth for embedded devices (20)

PDF
Implementing Trusted Endpoints in the Mobile World
PPTX
Null mumbai-reversing-IoT-firmware
PPTX
Making and breaking security in embedded devices
PPT
Control system including PLC cybersecurity
PPTX
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
PDF
Zephyr-Overview-20230124.pdf
PPT
Attacking Embedded Devices (No Axe Required)
PDF
Windy City Rails - Layered Security
PPTX
BSIDES-PR Keynote Hunting for Bad Guys
PPTX
How to create a secure IoT device
PPTX
"Mobile security: iOS", Yaroslav Vorontsov, DataArt
PPTX
Reverse Engineering.pptx
PDF
Pci Req
PPTX
How to Build Your Own Physical Pentesting Go-bag
PPTX
LAS16-300K2: Geoff Thorpe - IoT Zephyr
PDF
Track 5 session 2 - st dev con 2016 - security iot best practices
PPTX
Hacktrikz - Introduction to Information Security & Ethical Hacking
PDF
Mobile security chess board - attacks & defense
PPTX
What Does a Full Featured Security Strategy Look Like?
PPT
Power Grid Communications & Control Systems
Implementing Trusted Endpoints in the Mobile World
Null mumbai-reversing-IoT-firmware
Making and breaking security in embedded devices
Control system including PLC cybersecurity
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Zephyr-Overview-20230124.pdf
Attacking Embedded Devices (No Axe Required)
Windy City Rails - Layered Security
BSIDES-PR Keynote Hunting for Bad Guys
How to create a secure IoT device
"Mobile security: iOS", Yaroslav Vorontsov, DataArt
Reverse Engineering.pptx
Pci Req
How to Build Your Own Physical Pentesting Go-bag
LAS16-300K2: Geoff Thorpe - IoT Zephyr
Track 5 session 2 - st dev con 2016 - security iot best practices
Hacktrikz - Introduction to Information Security & Ethical Hacking
Mobile security chess board - attacks & defense
What Does a Full Featured Security Strategy Look Like?
Power Grid Communications & Control Systems
Ad

Recently uploaded (20)

PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
Digital Literacy And Online Safety on internet
PPTX
E -tech empowerment technologies PowerPoint
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
artificial intelligence overview of it and more
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Internet___Basics___Styled_ presentation
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PPT
Ethics in Information System - Management Information System
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
innovation process that make everything different.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
DOCX
Unit-3 cyber security network security of internet system
Introuction about ICD -10 and ICD-11 PPT.pptx
Digital Literacy And Online Safety on internet
E -tech empowerment technologies PowerPoint
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
artificial intelligence overview of it and more
presentation_pfe-universite-molay-seltan.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
Internet___Basics___Styled_ presentation
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
introduction about ICD -10 & ICD-11 ppt.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Mathew Digital SEO Checklist Guidlines 2025
Exploring VPS Hosting Trends for SMBs in 2025
Ethics in Information System - Management Information System
Cloud-Scale Log Monitoring _ Datadog.pdf
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
innovation process that make everything different.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
Unit-3 cyber security network security of internet system

Defense-in-depth for embedded devices

  • 2. DISCLAIMER The opinions and thoughts presented during the course of this presentation are my own and do not reflect the views or positions of my employer. 2
  • 3. #whoami • A security evangelist • Working with Resideo (Honeywell Homes) – Product Security • Contributor towards security communities; IS-RA, null, CysInfo, h1hakz, ISC2. • Speaker at security conferences RSA, c0c0n, IoT day etc. • Having security certifications from Offensive Security, SANS and EC- Council • Interested in IoT, ICS and SCADA Security 3
  • 4. Agenda • To know about embedded devices attack surface • And to protect them against hack
  • 5. How is Embedded Device look like?
  • 6. Embedded Device Stack • Attack Vectors • Device reconnaissance • Web Search Engines • FCCID • Open Source Libraries • Tempering the Device • Chip/components Identification • Datasheets • Pin-out Probes Hardware Components Hardware Protocols Boot/RootFS Application/Platform Kernel Bootloader / Firmware • Countermeasures • To protect the device IP • Service/User Manuals • Test Documents on FCCID • Securing Open source Libraries • Chip morphing • Temper Protection
  • 7. Embedded Device Stack • Attack Vectors • JTAG • UART • SPI • I2C • CANBUS • BDS Hardware Components Hardware Protocols Boot/RootFS Kernel Bootloader / Firmware Application/Platform • Countermeasures • Obfuscation of pin-outs • Remove the Traces • Blow Fuse in Pin-Outs • Encryption/Authentication • Key Token • Power Toggle • Read out Protections • Randomizing Probes • Set option Bits • Validating Assembly • CRC/ HASH • Custom Baud Rate
  • 8. Embedded Device Stack • Attack Vectors • U-Boot • RootFS • Firmware Signature • Root Certificates Hardware Components Hardware Protocols Boot/RootFS Kernel Bootloader / Firmware Application/Platform • Countermeasures • Run Time key Generation • Safe Zones • Using Secondary memory • Secure Boot enable • Authenticated RootFS • Obfuscated Signatures
  • 9. Embedded Device Stack • Attack Vectors • Memory Leakage • Stack overflow • Buffer Overflow • Unmanaged code • Kernel Crash • Unhandled exception • Side Channels Faults • Power glitching • NAND/Clock glitching • ThermalHardware Components Hardware Protocols Boot/RootFS Kernel Bootloader / Firmware Application/Platform • Countermeasures • Memory management • Exception handling • Fixing Zero days • Crash reporting/Self Healing • Circuit Power Handling • Glitch detectors • Brownout detectors • Lockstep cores • Asynchronous internal clock with dummy cycles • Internal Oscillators • Halt on invalid instruction execution • Lock down unnecessary diagnostic signals • Mutable codes
  • 10. Embedded Device Stack • Attack Vectors • Firmware Emulation • Reverse Engineering • Compression/Encryption • Hardcoded Credentials/Keys/Certificates • PII • Key Generation Algo • Backdoors Hardware Components Hardware Protocols Boot/RootFS Kernel Bootloader / Firmware Application/Platform • Countermeasures • Encryption • Compression • Obfuscation • Encoding • Certificates • Signatures • Run time Keys • Run time protection • Remove Backdoors • Randomized functions • Secure APIs/Libraries • Integral Updates • Complex key generations • Root of trust / Chain of Trust • Avoid Secondary memory
  • 11. Embedded Device Stack • Attack Vectors • Application Flaws • COAP • MQTT Hardware Components Hardware Protocols Boot/RootFS Kernel Bootloader / Firmware Application/Platform • Countermeasures • Secure API implementation • Auth Mechanism • Reliable node detection • Active search engine scans • Secure 3rd party libraries • TLS