Threat, Vulnerabilities and Mitigations: Hardware Vulnerabilities Flashcards

1
Q

What are the common console and debugging tools?

A

Hardware hacking often targets console and debugging tools, including:

JTAG: short for Joint Test Action Group.

UART: short for universal asynchronous receiver/transmitter.

I2C: short for Inter-Integrated Circuit.

SPI: short for serial peripheral interface.

How to figure out the diagram and pinpoint location of devices?

For information on devices, you can check the Federal Communications Commission (FCC) ID Database for documentation: https://www.fcc.gov/oet/ea/fccid:

Each device has a sticker with FCC ID on it.

Example is My TrendNet Router FCC ID: XU8-TEW731BRV2. Select Detail, and then select Internal Photos to view pictures of the inside of the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is JTAG used for?

A

JTAG (Joint Test Action Group) is a standard for verifying designs and testing printed circuit boards after manufacture. The standard provides a way to access the digital signals inside a device, enabling hardware engineers to perform boundary-scan testing, in-system programming of devices, and debugging of embedded systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is UART used for?

A

UART (Universal Asynchronous Receiver/Transmitter) is a hardware communication protocol used for asynchronous serial communication between devices. It converts parallel data from a CPU into serial form for transmission and vice versa. UARTs are commonly used in microcontrollers, modems, and other devices to facilitate communication over serial ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is I2C used for?

A

I2C (Inter-Integrated Circuit) is a multi-master, multi-slave, packet-switched, single-ended, serial communication bus widely used for attaching lower-speed peripheral ICs to processors and microcontrollers in short-distance, intra-board communication. It is often used in embedded systems for communication between components such as sensors, displays, and memory devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SPI used for?

A

SPI (Serial Peripheral Interface) is a synchronous serial communication protocol used for short-distance communication, primarily in embedded systems. It operates in full duplex mode, enabling simultaneous data transmission and reception between a master device and one or more slave devices. SPI is commonly used for communication with peripherals such as sensors, SD cards, and display modules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the other hardware hacking attacks?

A

Firmware
Side-Channel Attacks
Supply-Chain Attacks
End-of-life attacks
Legacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Side-Channel attacks?

A

Side-channel attacks: Requires sophisticated hardware to do. And example is TEMPEST. These attacks analyze what the processor is doing based on:

Power consumption

Electromagnetic (EM) radiation

Sound

Timing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Supply-chain attacks:

A

Supply-chain attacks: Attackers embed themselves into the supply chain, such as infecting computer chips. Examples:

https://www.bloomberg.com/features/2021-supermicro/

https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/?comments=1&comments-page=1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is end-of-life attacks?

A

End-of-life: Hardware eventually sundowns so need to start looking for an alternative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is legacy attacks?

A

Legacy: Just because something still has support doesn’t mean should be using it, as could have weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly