image image
Waleed AlZamil & Bandar Alharbi at Hardwear NL 2022

Waleed AlZamil & Bandar Alharbi



BYPASS NXP LPC-FAMILY DEBUG CHECK WITH VOLTAGE FAULT INJECTION






Talk Title:

BYPASS NXP LPC-FAMILY DEBUG CHECK WITH VOLTAGE FAULT INJECTION

Abstract:

The attack is on NXP LPC family microcontrollers (LPC 811, LPC 1114, LPC 1343, LPC 1751, LPC 2101, LPC 2148, and maybe more) which they are used in High-Power USB dongles, Low Power Communication Transmitters, eMetering, Industrial networking, and Alarm systems, and are vulnerable to voltage fault injection to enable the debug interface.


Speaker Bio:

Waleed works as a embedded devices security researcher for COEIA in Saudi Arabia. Graduated in 2017 as computer engineer, worked as IoT developer, web and network pentester and in 2019 he moved to embedded devices as researcher. He is most focused on reverse engineering firmware and fault injection.

Bandar Alharbi is a cybersecurity researcher at CoEIA his mainly focus on embedded system security, spending his time in designing&developing and evaluating embedded systems.
Recently, he focused on reverse engineering and side channel attacks for embedded systems.