This presentation demonstrates a method of brute-forcing an AES-256 encrypted hard drive by spoofing the front-panel keyboard. In addition to tears into the internal design of the hard drive, and extends the work by J. Czarny & R. Rigo to validate the (in)security of any encrypted drive based on the MB86C311 chipset.
Colin O'Flynn has developed the world's first open-source platform for side-channel power analysis and glitching attacks, and has spoken around the worldabout the application of this platform to various targets. Previously heworked with Atmel developing low-power wireless embedded systems, andcontinues to write about FPGAs for Circuit Cellar magazine. He lives inHalifax, NS, Canada.