Hardware Village
Howdy partner! For the first time in BSidesTLV history, we are excited to introduce the Hardware Village!
This year’s event will host a range of engaging activities designed to immerse attendees in the world of Hardware research, exploitation, and design.
We invite you to join us in this groundbreaking initiative and be part of a collaborative effort to shape the future of cybersecurity.
Our Vision
The Hardware Village is dedicated to exploring the world of hardware security and sharing knowledge across the community. We are looking to cover many topics in the Hardware security space such as Secure hardware design, verification of hardware, hardware attacks, and designing hardware attack tools.
We aim to bring vendors and security experts together to improve the security of the hardware which underlies all our digital society by understanding attack surfaces, attack methods, secure design concepts, and security processes.
At BSidesTLV, we’ll host technical talks, live demos, and a special workshop to give our attendees a deep dive into the current state of the Hardware security field from an offensive and a defensive perspective.
Whether you’re a seasoned cybersecurity pro or just starting out, we’ve got something for everyone. So saddle up and join us at the Hardware Village! Yeehaw!
Schedule
11:00-11:30 How to trust your open-source ASIC by Leonid Azriel
11:30-12:00 Firmware security testing with Fault Injection Simulation by Jan Jager
12:00-12:30 Bolt-on security for existing and new designs with Secure Flash by Nir Tasher
12:30-13:00 CYMOCAN - An open-source USB CAN-FD adapter by Benny Meisel
13:00-14:00 LUNCH
14:00-14:45 Networking & Demo Time
14:45-15:30 Introduction to Correlation Power Analysis by Yossi Oren & Michael Amar
15:30-16:00 Side Channel & Fault Injection Attacks on Modern Embedded Devices by Oren Hollander
Agenda
How to trust your open-source ASIC
Dr. Leonid Azriel
Open-source IC is not a new concept. Nevertheless, usage of open-source by the hardware community has been limited until recently. In the last few years, the introduction of the RISC-V open architecture helped to bring fresh energy to open-source IC, and many new projects have emerged. In addition to many benefits in productivity and quality, the open-source model contributes to product security by following the Kerckhoff’s principle of open algorithm. However, unlike in software, in the IC world there is a long way from the source to the finished product, and it is hard to guarantee that the product indeed implements the algorithm as advertised. In this talk, I will discuss possible schemes, methodologies and policies to verify the compliance of the integrated circuit to the claimed open source and propose a scheme based on the existing Design-for-Test technology.
Firmware security testing with Fault Injection Simulation
Jan Jager
I will address the effect Fault Injection has on the firmware and how to simulate fault injection attacks. I will demonstrate with a sample code with FI attacks before and after mitigation.
Bolt-on security for existing and new designs with Secure Flash
Nir Tasher
Real world designs today suffer from profound security vulnerabilities. Regardless of platform type, once they are connected to any network, it opens up numerous attack vectors. Chaos agents exploit software vulnerabilities to upload and execute malicious code, with focus on making attacks persistent. Persistent attacks are much harder to detect and recover from, and allow the attackers to fine tune the timing and scale of their attacks. A persistent attack requires modification of the system non-volatile storage. The most sensitive and thus sought after is the boot loader. Pawning the system boot loader allows an attacker to achieve almost anything in terms of compromising the system and in many cases, the entire infrastructure. Protecting the non-volatile code storage, and in particular the boot loader, is the essence of the secure flash. The secure flash guarantees that code can only be modified by a trusted entity. It prevents rolling back the system to older code, and allows the system and infrastructure to create a root of trust for various operations such as platform attestation. And it offers this security hardening with almost zero changes to the system and existing software stack.
CYMOCAN - An open-source USB CAN-FD adapter
Benny Meisels
CYMOCAN is a hardware tool which allows a Linux system to connect to a CAN bus over USB. The commercial products in this space can be very costly and some require software licenses. With CYMOCAN we aim to offer a cheaper alternative for hobbyists and professionals while also supporting both the CAN and CAN-FD protocols.
Uncovering Secrets with Correlation Power Analysis
Yossi Oren & Michael Amar
Did you know that the power consumption of a device contains information about the data it processes and the instructions it executes? In this talk, we will show how to exploit this power side channel to gain insights about the secret internal state of a device, and how to use these insights as a stepping stone for reverse engineering. The talk will show how a typical attacker setup looks like, and will include a live demo on a ChipWhisperer Nano device.
Side Channel & Fault Injection Attacks on Modern Embedded Devices
Oren Hollander
All modern cryptographic algorithms, whether they are implemented by hardware or by software, are all based on the digital computations that are performed on physical devices. When executing the cryptographic computations, the device consumes power and emits heat, electromagnetic radiation, and so on. Fault injection involves manipulating environmental variables in a system (e.g. clock, power, temperature, etc.) in order to cause a fault – a disturbance in the normal operation of the chip. As execution continues, the disturbance propagates, which results in undesired state. Many MPUs, MCUs and FPGAs are vulnerable to such attacks. In this talk we are going to understand how these attacks work.
Speakers
Dr. Leonid Azriel

Dr. Leonid Azriel is a hardware security researcher at the Computer Science department in the Technion - Israel Institute of Technology. His main specialization is IC reverse engineering.Dr Azriel spent about 15 years in the industry before returning to academia. He served at different technical and managerial positions at National Semiconductor, Winbond Electronics and Nuvoton Technologies companies, where he lead the development of the Trusted Platform Module (TPM). https://www.linkedin.com/in/azriel/
Jan Jager

Nir Tasher

Mr. Nir Tasher serves as Technology Executive for Winbond and has been with the Winbond group since 2005 serving in various technology related positions. In his current position, Mr Tasher is in charge of the technology and architecture group of Winbond’s security products. Mr Tasher has over 25 years of experience in the technology industry. He holds over 30 US patents in various fields of security and system design. Mr. Tasher hold a MSc. EE. Cum Laude from Tel Aviv University.
Benny Meisels

Benny Meisels is a security architect with 10 years of security research experience in Both IT and embedded systems. In his current role Benny is the Lead Solution Architect at CYMOTIVE. He enjoys figuring out how complex systems operate and how to improve their design. His research topics include embedded software security, automotive architecture security, and HW security. After work hours Benny enjoys long walks and working on electronic conference badges. For the past 5 years, Benny has been working in CYMOTIVE on automotive research and architecture. https://www.linkedin.com/in/benny-meisels https://twitter.com/benny_meisels
Dr. Yossi Oren

Dr. Yossi Oren is a Senior Lecturer in the Department of Software and Information Systems Engineering at Ben Gurion University of the Negev, and a member of BGU’s Cyber Security Research Center. His research interests include implementation security (side-channel attacks, micro-architectural attacks, power analysis and other hardware attacks and countermeasures; low-resource cryptographic constructions for lightweight computers) and cryptography in the real world (consumer and voter privacy in the digital era; web application security). He has been recognized by The Register as a Top Boffin.
https://twitter.com/yossioren https://linkedin.com/in/yossioren
Michael Amar

Michael Amar received the Bachelor of Science (B.Sc.) in Software Engineering from Ben Gurion University of the Negev (BGU), Beer-Sheva, Israel. He is pursuing his Master of Science (M.Sc.) in the Software and Information Systems Engineering Department at Ben Gurion University of the Negev (BGU), Beer-Sheva, Israel. Michael’s current research interests are side channel analysis and machine learning.
https://twitter.com/amarmic96 https://linkedin.com/in/michael-amar
Oren Hollander

Mr Oren Hollander has over 20 years of FPGA, ARM, Security design & training experience. Oren is an Intel, ARM, NXP, ST, NewAE, eShard, and Microchip authorized trainer. Oren trained over the years thousands of engineers around the world in FPGA design, Arm architecture, security for Embedded systems & FPGA security. Oren trains the top noche silicon vendors such as Apple, Samsung, Marvell, NXP, Intel, Broadcom, Microchip to name a few, so his knowledge is always one step ahead of the general market. Oren specialized in the military field as well, and works as senior consultant to the top notch military companies in Israel and abroad. Oren works closely with the silicon vendors and security researchers to bring the latest and greatest know-how and experience to the market.
Call for Papers
Note: The Call for Papers is now closed.
In line with our vision, we are looking for innovative and groundbreaking presentations on offensive/defensive hardware research. The Hardware Village will host technical talks, workshops, live demos, panel discussions, and other hands-on activities.
We invite you to submit your proposals for talks at the Hardware Village during BSidesTLV on Thursday, June 29th, 2023. Our CFP is open from Tuesday, 30th March till May 1st, 2023.
Topics we would like to hear about:
We are interested in new and cutting edge security work in defensive and offensive domains. Security topics that interest us include (but are not limited to): Hardware Components (Integrated Circuits, System-On-Chip, Microcontrollers etc.) Embedded Systems and Connected Devices Automotive, Aerospace and Locomotive systems Industrial Control Systems and Medical Devices Firmware, Wired and Wireless Communication Protocols Secure Hardware (Hardware Security Modules, Trusted Execution Environment, Trusted Platform Module, Security Elements) Attacks & Countermeasures
Available speaking slots include:
Regular talk (25 minutes)
Deep-dive, technical talk (45 minutes, which should include a workshop or a live demo)
Lightning talk (10 minutes)
Panel (30 minutes, which should include a few members)
Submit your proposal here: Hardware Village CFP
Call for Volunteers
We’re looking for volunteers to help us run the Hardware Village this year.
If you’re interested in joining our team, please reach out to us via email at [email protected].
Leadership
Benny Meisels
Benny Meisels is an Automotive Security Researcher which loves tinkering with hardware and learning what makes it tick. He is currently Lead Solution Architect at CYMOTIVE working on advancing Automotive Security. https://www.linkedin.com/in/benny-meisels https://twitter.com/benny_meisels
Antriksh Shah
Antriksh Shah is a security enthusiast from Goa and a serial entrepreneur in the field of information security (Nullcon , Payatu, Hardwear.io) https://www.linkedin.com/in/antriksh-shah https://twitter.com/antriksh_s