Attacking encrypted USB keys the hard(ware) wayAttacking encrypted USB keys the hard(ware) way
  1. talk
  2. hacking

Attacking encrypted USB keys the hard(ware) way

Available Media

video

Slides (pdf)

Slides (Online)

ConferenceBlack Hat USA 2017
AuthorsJean-Michel Picod , Rémi Audebert , Elie Bursztein

Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data.

In this talk, we will present our methodology to assess “secure” USB devices both from the software and the hardware perspectives. We will demonstrate how this methodology works in practice via a set of case-studies. We will demonstrate some of the practical attacks we found during our audit so you will learn what type of vulnerability to look for and how to exploit them. Armed with this knowledge and our tools, you will be able to evaluate the security of the USB device of your choice.

newsletter signup slide

Get cutting edge research directly in your inbox.

newsletter signup slide

Get cutting edge research directly in your inbox.