Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

What de.fac2? Attacking an opensource U2F device in 30 minutes or less

2023

Day 1

Milliways

Sergei Volokitin

camp2023

camp2023 eng

camp2023 ov

ccc

cccamp23

chaos

communication

Автор: media.ccc.de

Загружено: 16 авг. 2023 г.

Просмотров: 5 871 просмотр

Описание:

https://media.ccc.de/v/camp2023-57244...



Hardware FIDO U2F tokens are security devices which are meant to defend user second factor keys from physical and remote attacks.
In this presentation different security features and implemented by FIDO U2F tokens and how they are meant to protect a user from various attack scenarios.
We will focus on the open source implementation of FIDO U2F token developed and Common Criteria certified by Federal Office for Information Security (BSI).
Having access not only to the source code of the token applet, but the certification documents as well gives a unique opportunity of
Finally, a design flaw in the solution is discussed (CVE-2022-33172) and an attack on hardware token security feature will be presented, which could allow an attacker in control of user PC to fake user presence and execute a number of unauthorized sensitive operations.

De.fac2 is a Common Criteria (CC) and FIDO certified FIDO U2F Java Card applet developed and certified by Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik).
This solutions gives a unique opportunity to look at the internals of a FIDO U2F token as well as certification claims and product security features.

The presentation introduces the process of identification of the design flaw in the product in under an hour as well as the testing of a vulnerability without access to the actual physical device.

The vulnerability was disclosed to the Bundesamt für Sicherheit in der Informationstechnik and addressed in the updated commit
https://github.com/BSI-Bund/de.fac2

The acknowledged bug was addressed by the developer with the following statement:

The following attack scenario was reported to us by Sergei Volokitin: A reset command send by the reader to the card circumvents the user presence check.
For example, malware on the host PC / smartphone could send a reset command to the reader programmatically.
It is not possible for the card to distinguish if the reader sent a reset command or if it was physically removed from the reader.
With reference to this scenario, the Guidance Documentation (AGD) and the Security Target (ST) were updated in July 2022 in a "Assurance Maintenance".

Sergei Volokitin

https://pretalx.c3voc.de/camp2023/tal...

#camp2023 #Milliways

What de.fac2? Attacking an opensource U2F device in 30 minutes or less

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

TrustMeRelay? Investigating Apple's iCloud Private Relay

TrustMeRelay? Investigating Apple's iCloud Private Relay

Yaml Tutorial | Learn YAML in 18 mins

Yaml Tutorial | Learn YAML in 18 mins

Cybersecurity Architecture: Response

Cybersecurity Architecture: Response

Никакой Рекламы Расслабляющая Музыка Для Сна, Избавление От Бессонницы Навсегда - Исцеление От Ст...

Никакой Рекламы Расслабляющая Музыка Для Сна, Избавление От Бессонницы Навсегда - Исцеление От Ст...

SilverBullet Intro & Demo (v2 edition)

SilverBullet Intro & Demo (v2 edition)

3. Apache Kafka Fundamentals | Apache Kafka Fundamentals

3. Apache Kafka Fundamentals | Apache Kafka Fundamentals

5 Pieces by Hans Zimmer \\ Iconic Soundtracks \\ Relaxing Piano [20min]

5 Pieces by Hans Zimmer \\ Iconic Soundtracks \\ Relaxing Piano [20min]

Kevin Heneka: IoT-Security nach ETSI/EN303645

Kevin Heneka: IoT-Security nach ETSI/EN303645

WTF DJI, UAV CTF?!

WTF DJI, UAV CTF?!

DNS Records Explained

DNS Records Explained

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]