Skip to content

CSAW ESC 2023 - Writeup from BitsFromBZH team

Notifications You must be signed in to change notification settings

adamhlt/CSAW-ESC-2023

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

41 Commits
 
 
 
 
 
 
 
 

Repository files navigation

                   ___________ ___ _       __   ___________ ______   ___   ____ ___  _____
                  / ____/ ___//   | |     / /  / ____/ ___// ____/  |__ \ / __ \__ \|__  /
                 / /    \__ \/ /| | | /| / /  / __/  \__ \/ /       __/ // / / /_/ / /_ <
                / /___ ___/ / ___ | |/ |/ /  / /___ ___/ / /___    / __// /_/ / __/___/ /
                \____//____/_/  |_|__/|__/  /_____//____/\____/   /____/\____/____/____/
                                                                      
                                                                     
                                               CSAW ESC 2023  
                                            BitsFromBZH Writeup 

Python Any OS AVR

Overview

ESC is an educational, research-oriented tournament aimed at hacking into the hardware of embedded systems. First run in 2008, it is the oldest hardware security competition in the world, 2023 represents ESC's 16-year anniversary.

Past ESC competitions have focused on data exfiltration attacks against IoT devices, hacking the firmware of a RISC-V wifi access point and executing side channel/fault injection attacks using a popular ChipWhisperer board.

This year's ESC focuses on side channel attacks (SCA) on cyber-physical systems (CPS). Cyber-physical systems are used by hundreds of industries and in many critical infrastructure systems. If these CPSs are not properly setup they can leak information even if they are using cryptographically secure software. This year, teams will investigate a range of SCAs on an Arduino Uno based CPS running several firmware that expose various side channels.

The event comprises a qualification and a competition phase where teams will be able to explore several variations of a CPS and exploit side channels they find while suggesting mitigations for the found exploits.

Challenges

  • AllWhiteParty
  • Bluebox
  • Operation SPItFire
  • czNxdTNuYzM
  • Sock and Roll
  • Vender Bender

Team members

  • Adam Henault
  • Florian Lecocq
  • Axel Gouriou
  • Philippe Tanguy (Faculty Advisor)