In this half hour session, we consider the technology behind constructing the HCPP NFC badge from all angles. Beginning with samples of prototypes and badges from other conferences, we contrast features integrated into the ST Microelectronics powered EEPROM storage allowing for access control, identification, cryptocurrency applications, and data agnostic storage. Moving to the HCPP badge itself, we place it's surface under a close range circuit camera and identify contacts and pins machine the feature set in question. We tap the I/O serial bus legs of the NFC chip and consider the implications of tapping the RF contacts with an oscilloscope, actually performing this penetration test if we have time.
Illustrating a number of possible direct I/O attacks, we scan the I2C bus using a bus pirate and consider the opportunistic defense protection from simple tactile switches as implemented. Following practical attack and defense strategy, we imagine what could be the problem of using NFC on a more specialised hardware wallet like Trezor.
Moving towards research and development workflow, we use the close range circuit camera again on a number of antenna designs, describing the tradeoffs of each and explaining the decision to use a small 40x20 8 looped exposed trace antenna to carry the 915 MHz RF signal to its active circuit destination. We reflect on the machinery used in construction as well as testing, and run through a hypothetical Opensource schematic and layout workflow concluding in a finished PCB received from a fabrication contract service in the Czech Republic.
This presentation suits novice hardware engineers. Anybody who has once taken apart a computing device and seen the green circuit board inside, is well prepared to understand the topics in question and learn from the Monero Hardware team’s appearance with Michael’s guidance in this speech.