Home
The Id of IoT Blog
Archive
Contact

Subscribe

New posts weekly.

Thank you!

Security Embedded is 15+ years of experience in building secure systems. Learn more about how we can help you by exploring Phil's blog or contacting us.

Security Embedded
Under the Hood of WebAuthn in Safari
May 3

May 3 Under the Hood of WebAuthn in Safari

Phil Vachon
Principia Securitas, Hardware Security

At WWDC in 2020, Apple announced Touch ID and Face ID authentication for the Web as a new feature in Safari.

We are not at the Precipice of a GPS Disaster
Feb 14

Feb 14 We are not at the Precipice of a GPS Disaster

Phil Vachon

Are we at risk of a GPS crisis? Attacks on GPS are commonplace in various forms, but this doesn’t mean GPS is the problem, but rather how we use it is.

Application Trust is Hard, but Apple does it Well
Nov 14

Nov 14 Application Trust is Hard, but Apple does it Well

Phil Vachon
Principia Securitas

On November 12, 2020 Apple released macOS Big Sur. In the hours after the release went live, somewhere in Apple's infrastructure an OCSP esponder cried out in pain…

A Treatise on Voting Machines
Aug 12

Aug 12 A Treatise on Voting Machines

Phil Vachon
Hardware Security

he Voting Machine Village, round two, took place at DEFCON this past weekend.

Dec 9
Dec 9 A Pragmatic Look at Trust

Phil Vachon
Hardware Security

As I write this at the end of 2017, I think it's safe to say this year was the year of the breach. Major privacy breaches achieved public notoriety. Huge corporations realized that trusting supply chain is actually a real problem...

Mar 18
Mar 18 Security Specifications for the Layperson

Phil Vachon
Crypto Disasters, Principia Securitas

IoT and computer security fears are at the forefront of the news cycle. Foreign hackers, malfeasants from America or government-sponsored entities are hacking your home...

Jan 16
Jan 16 Weaponizing Reverse Engineered Knowledge

Phil Vachon
Hardware Security, Wireless Security

The end of 2016 saw me spending a great deal of time working on wireless communications protocols. Most of this turned out to be catching data over the air, modulated with OOK/ASK, some 2FSK.

Aug 28
Aug 28 Securing BLE Links

Phil Vachon
Principia Securitas, Embedded Design Practices

We're starting to see Bluetooth Low Energy (BLE) show up everywhere. Fitness trackers, IoT doohickeys, deadbolt locks and even security tokens are showing up with BLE. By treating your cell phone as the center of life, things have never been more convenient.

Aug 21
Aug 21 When NULL is a Valid Address

Phil Vachon
Embedded Design Practices

A recent project led to spelunking through a proprietary RTOS built for an embedded device. The engineers who worked on this project were quite bright. There was extensive use of dlmalloc, in the form of the verison embedded in Newlib.

Aug 16
Aug 16 Control the (Command) Conversation

Phil Vachon
Principia Securitas

Devices that provide 'local' APIs (i.e. services exposed to the local network) tend to be a lot easier to exploit. A buffer overflow here. A command injection there. Pre-authorization exploits abound! But, devices that only listen to external services for commands tend to be harder targets.

Aug 8
Aug 8 Cryptography Does Not Always Mean Encryption

Phil Vachon
Embedded Design Practices, Principia Securitas

Sometimes you just want to verify that the user has a secret. A secret comes in many forms - a key, a random value, a secret function. How could we verify a user has a secret without building a heavy, cryptographically secure channel?

Aug 7
Aug 7 The Challenges of a Lightweight Secure Channel

Phil Vachon
Principia Securitas, Crypto Disasters

Far too often, cryptography gets treated as a mysterious salve. Apply some ECC here, some RSA there, then use some AES to round it all off. But, there are several factors that limit how secure a channel can be.

Jul 30
Jul 30 There's No Security Without Entropy

Phil Vachon
Principia Securitas

Most cryptosystems rely on access to true random data. For public key schemes like RSA, you need to generate two random primes to generate your keys. Let's look at how hard it can be to generate real random numbers.

Jul 24
Jul 24 Do you need an OS?

Phil Vachon
Embedded Design Practices

Do you need a full-fledged, pre-emptive multitasking operating system? Will a simple RTOS do the job? Let's look at where the wrong tool has been used for the job.

Jul 22
Jul 22 Malloc is an Antipattern

Phil Vachon
Embedded Design Practices

Dynamic allocation will always undermine determinism and performance of a system. True real time systems will always operate on fixed bounds for every aspect of the system. What are some approaches to simplify memory management?

Jul 18
Jul 18 Building a Chain of Trust at Boot

Phil Vachon
Principia Securitas

Firmware is made up of many layers. These are obvious: a bootloader, an RTOS, your application(s), etc. At startup you want to be able to guarantee the integrity of all that code.

Jul 16
Jul 16 Is Fixing Symmetric Keys The Worst Sin?

Phil Vachon
Principia Securitas, Crypto Disasters

We've discussed why you don't fix IVs for AES-CBC. We've touched on the limitations of only using symmetric keys in your application. We've even covered the challenges of protecting symmetric keys. But one sin we have not discussed is fixing your keys.

Jul 15
Jul 15 Firmware Updates Gone Wrong: Part 3

Phil Vachon
Principia Securitas, Crypto Disasters

Public Key Cryptography simplifies authentication. We can use a public key to authenticate firmware updates signed with the private key. Everything seems pretty clear at this point. But we need to keep our keys secure! How can we approach that...

Jul 13
Jul 13 Attacking Crypto Using Stolen Keys

Phil Vachon
Crypto Disasters

So we stole the keys to the castle, now what? Let's look at how we can take the key and IV we've extracted for our device to decrypt the payloads. Then we can start reverse engineering the communication protocol used by the device.

Jul 12
Jul 12 How Trustworthy is that App with those Capabilities?

Phil Vachon
Principia Securitas

It seems that Pokemon Go has taken the world by storm. Let's zero in on the issue of application capabilities, or permissions in Android parlance. And let's talk about asking for too much of the user.

Load More
 

Security Embedded is Phil Vachon. Phil loves breaking things, figuring out how they work, and building new things with that knowledge.

 

Home     Blog     Archive     Contact     Twitter