Corpus ID: 85512525

Modern Game Console Exploitation

@inproceedings{Debusschere2012ModernGC,
  title={Modern Game Console Exploitation},
  author={E. Debusschere and Mike McCambridge},
  year={2012}
}
The goal of this paper is to provide a high-level, technical summary of the significant exploitations of the Xbox 360 and PlayStation 3. Few academic resources discussing console exploitation exist, especially resources considering the current generation systems, and thus a technical survey of successful exploitations represents a significant contribution to the academic community. The security of both the Xbox 360 and PS3 are discussed, along with the three main Xbox 360 exploits: the King… Expand

Figures from this paper

Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses
TLDR
A glitching emulation framework is introduced, an open-source, software-based glitching defense tool that can automatically insert glitching defenses into any existing source code, in an architecture-independent way and GLITCHRESISTOR is evaluated, which integrates numerous software-only defenses against powerful and real-world glitching attacks. Expand
LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells
TLDR
This paper implements LAHEL as a hardware IP core which interfaces with the CoreSight Debug Architecture available in modern ARM cores and shows how it can be integrated to system on chip designs allowing for microcontroller vendors to easily add the authors' defense into their products. Expand
Protection of heterogeneous architectures on FPGAs: An approach based on hardware firewalls
TLDR
This work presents an approach to protect communications in multiprocessor architectures based on hardware security enhancements acting as firewalls that demonstrates a reduction up to 33% in terms of latency overhead compared to existing efforts. Expand
Security vulnerability analysis of design-for-test exploits for asset protection in SoCs
TLDR
A novel automated security vulnerability analysis framework is proposed to identify violations of confidentiality, integrity, and availability policies caused by test structures and designer oversights during SoC integration. Expand
On improving cybersecurity through memory isolation using systems management mode
TLDR
This thesis describes research into security mechanisms for protecting sensitive areas of memory from tampering or intrusion using the facilities of Systems Management Mode, and focuses on the creation of a small dedicated area to perform cryptographic operations, isolated from the rest of the system. Expand
Design and Implementation of a Negative Voltage Fault Injection Attack Prototype
Fault attacks are a well known physical attack type. A common fault injection technique is a short term variation of the supply voltage causing a vulnerable processor to misinterpret or skipExpand
FPGA based Blockchain System for Industrial IoT
TLDR
A novel field programmable gate array (FPGA) based blockchain system that leverages the FPGA to build a simple but efficient TEE for IIoT devices, and removes the single root-of-trust by allowing all stakeholders to participate in the management of the devices. Expand
Exploiting JTAG and Its Mitigation in IOT: A Survey
TLDR
This paper reviews previous successful JTAG exploitations of well-known devices operating online and also reviews some proposed possible solutions to see how they can affect IoT products in a broader sense. Expand
A robust scan-based side-channel attack method against HMAC-SHA-256 circuits
TLDR
This paper proposes a scan-based attack method against a hash generator circuit called HMAC-SHA-256, which restores the secret information by finding out the correspondence between the scan data obtained from a scan chain and the internal registers in the targetHMAC- SHA-256 circuit. Expand
A Plug and Play Digital ABIST Controller for Analog Sensors in Secure Devices
TLDR
A plug and play digital ABIST controller which allows to run external or internal autonomous built-in self-test phases on a temperature sensor used as case study and is fully compliant with the IEEE Std. Expand
...
1
2
...

References

SHOWING 1-10 OF 17 REFERENCES
Hacking the Xbox: An Introduction to Reverse Engineering
From the Publisher: This hands-on guide to hacking Microsoft's powerful video games console starts with step-by-step tutorials on hardware modification that teach basic hacking techniques as well asExpand
27c3 - console hacking
  • http://vimeo.com/18278625,
  • 2010
How the ps3 hypervisor was hacked
  • http://rdist.root.org/2010/01/27/ how-the-ps3-hypervisor-was-hacked/,
  • 2010
Why silicon based seucrity is still that hard: Deconstructing xbox 360 security
  • 2007
Xbox 360 hypervisor privilege escalation vulnerability
  • http:// securityvulns.com/Qdocument211.html,
  • 2007
First criminal trial over game-console modding begins tuesday
  • Hacking the Xbox : An Introduction to Reverse Engineering
  • 2010
Modder arrest a reminder that most console hacks are illegal
  • ARS Technica,
  • 2010
Dangerous xbox 360 update killing homebrew
  • http://www.free60.org/index. php?title=849x_System_Update&redirect=no,
  • 2009
Crackstation uses game console for hacking
  • 2007
Cell’s security architecture: Ibm’s prize and sony’s achilles heel
  • http: //arstechnica.com/old/content/2006/04/6694.ars,
  • 2006
...
1
2
...