37C3 - Breaking "DRM" in Polish trains

Title:
37C3 - Breaking "DRM" in Polish trains
Description:

https://media.ccc.de/v/37c3-12142-breaking_drm_in_polish_trains

Reverse engineering a train to analyze a suspicious malfunction

We've all been there: the trains you're servicing for a customer suddenly brick themselves and the manufacturer claims that's because you've interfered with a security system.

This talk will tell the story of a series of Polish EMUs (Electric Multiple Unit) that all refused to move a few days after arriving at an “unauthorized” service company. We'll go over how a train control system actually works, how we reverse-engineered one and what sort of magical “security” systems we actually found inside of it.

Reality sometimes is stranger than the wildest CTF task. Reality sometimes is running `unlock.py` on a dozen trains.

The talk will be a mix of technical and non-technical aspects of analysis which should be understandable for anyone with a technical background. We’ll briefly explain how modern EMUs look like inside, how the Train Control & Monitoring System works, and how to analyze TriCore machine code.

Redford
q3k
MrTick

https://events.ccc.de/congress/2023/hub/event/breaking_drm_in_polish_trains/

#37c3 #HardwareMaking

more » « less
Video Language:
English
Duration:
01:01:46
http://www.youtube.com/watch?v=XrlrbfGZo2k
Format: Youtube
Primary
Original
Added   by C3Subtitles
Format: Youtube
Primary
Original
http://www.youtube.com/watch?v=0GkV_XhVlBM
Format: Youtube
Added   by C3Subtitles
Format: Youtube
http://www.youtube.com/watch?v=LlxxnfWZ8a4
Format: Youtube
Added   by C3Subtitles
Format: Youtube
This video is part of Amara Public.

Subtitles download

Incomplete subtitles (1)