+ All Categories
Home > Documents > Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University...

Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University...

Date post: 23-Sep-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
19
Automated Reverse Engineering using Lego® Georg Chalupar and Stefan Peherstorfer University of Applied Sciences Upper Austria Erik Poll and Joeri de Ruiter Radboud University Nijmegen
Transcript
Page 1: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Automated Reverse Engineering using Lego®

Georg Chalupar and Stefan PeherstorferUniversity of Applied Sciences Upper Austria

Erik Poll and Joeri de RuiterRadboud University Nijmegen

Page 2: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 2 / 19

Introduction

● Used automated learning techniques to reverse engineer e.dentifier2

● Results in state machines● Previously done for bank cards

Page 3: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19

e.dentifier2

● Developed by Todos (now Gemalto)

● EMV-CAP● Can be used with or without USB● With USB:

● See-What-You-Sign● “the most secure sign-what-you-see

end user device ever seen”● Good idea!

Page 4: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 4 / 19

EMV-CAP

challenge

bitfilter(AC)

PIN

GENERATE AC (challenge,...)

AC

PIN

OK

Page 5: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 5 / 19

Protocol e.dentifier2

Page 6: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 6 / 19

Protocol e.dentifier2

Page 7: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 7 / 19

Protocol e.dentifier2

Page 8: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 8 / 19

Protocol e.dentifier2

Page 9: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 9 / 19

Automated learning

● Used LearnLib● Implementation of

adapted L* algorithm

● Complete Mealy machine

● Equivalence queries approximated● Random traces● W-method

Page 10: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 10 / 19

Using automated learning

● Reverse engineering● Manual inspection of correctness and security

● Fuzzing or model-based testing● Use as basis for automated fuzz testing

● Formal verification● Use as basis for model checking

Page 11: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 11 / 19

Automated reverse engineering

● Two different versions of the device● Programmable smart card

● All PIN codes accepted● Responses fixed

● Physical interaction needed

Page 12: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 12 / 19

Robot

● Built using Lego● Controlled by Raspberry Pi

● 3 motors: OK, Cancel, digit● Power USB line● USB commands

Page 13: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 13 / 19

Robot

Page 14: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 14 / 19

Robot

Page 15: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 15 / 19

Results

Page 16: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 16 / 19

Results

Page 17: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 17 / 19

Model checking

● Converted output to labelled transition system● Used model checker CADP● Checked property in modal logic

● Is valid cryptogram generated only after OK button is pushed?

● Resulted in an attack trace for the old device

Page 18: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 18 / 19

Conclusions

● Automated learning techniques● Useful in security analysis for embedded devices● Can automatically find security vulnerabilities● Good excuse to play with Lego

Page 19: Automated Reverse Engineering using Lego®...Joeri de Ruiter - Digital Security, Radboud University Nijmegen 3 / 19 e.dentifier2 Developed by Todos (now Gemalto) EMV-CAP Can be used

Joeri de Ruiter - Digital Security, Radboud University Nijmegen 19 / 19

Conclusions

● Automated learning techniques● Useful in security analysis for embedded devices● Can automatically find security vulnerabilities● Good excuse to play with Lego

Thanks for your attention!


Recommended