Glitched_on_Earth_by_humans_A_Black_Box_Security_Evaluation_of_the.pdf
13.7 MB
📡Glitched on Earth by Humans:
A Black-Box Security Evaluation of the SpaceX Starlink User Terminal
This presentation covers the first black-box hardware security evaluation of the SpaceX Starlink User Terminal (UT). The UT uses a custom quad-core Cortex-A53 System-on-Chip that implements verified boot based on the ARM trusted firmware (TF-A) project. The early stage TF-A bootloaders, and in particular the immutable ROM bootloader include custom fault injection countermeasures. Despite the black-box nature of our evaluation we were able to bypass signature verification during execution of the ROM bootloader using voltage fault injection.
📺Now available on YouTube
A Black-Box Security Evaluation of the SpaceX Starlink User Terminal
This presentation covers the first black-box hardware security evaluation of the SpaceX Starlink User Terminal (UT). The UT uses a custom quad-core Cortex-A53 System-on-Chip that implements verified boot based on the ARM trusted firmware (TF-A) project. The early stage TF-A bootloaders, and in particular the immutable ROM bootloader include custom fault injection countermeasures. Despite the black-box nature of our evaluation we were able to bypass signature verification during execution of the ROM bootloader using voltage fault injection.
📺Now available on YouTube
https://www.youtube.com/watch?v=myKs04lfuy8Starlink-FI.zip
15.6 MB
🛰This repository(Starlink-FI) accompanies the talk noscriptd "Glitched on Earth by Humans: A Black-Box Security Evaluation of the SpaceX Starlink User Terminal".
❤3👍1