FINSEC 2024
1
× Photo Booth

The Rising Importance of Hardware and Device Security in the BFSI Sector

Over the past five years, the financial sector has witnessed a dramatic transformation, driven by innovations like the Unified Payments Interface (UPI), mobile wallets, and digital lending platforms. This rapid digitisation highlights the crucial need for robust security measures, encompassing both hardware and software, to ensure secure transactions and protect the trust and integrity of the digital financial ecosystem. The widespread adoption of these platforms and services has not only introduced new device form factors, such as payment boxes, which must instantly communicate with banking infrastructure to confirm users' transactions on their mobile phones, but also demanded the existing devices, such as point of sale (PoS) machines to support a more comprehensive feature set such as dynamic QR codes, more interfaces, etc., These new device form-factors and features means more attack surface, including hardware-based attack vectors.

Prevalent hardware-based attacks in BFSI sector

While software attack vectors are well understood, knowledge about hardware-based attack vectors—such as side-channel analysis, fault injection, and hardware trojans—is still evolving. Side Channel Analysis involves analysis of unintended emissions (such as power consumption, electromagnetic radiation, optical emissions, heat, etc.) from the product to understand the inner working(s) of the product(s), which may be leveraged to mount a potent attack. In contrast, the Fault Injection involves operating a device for a short duration beyond its operating parameters (such as voltage, clock glitching, electromagnetic radiation, etc.) to alter the operation flow. Hardware attacks, once successful, are challenging to mitigate owing to the significant operational challenges involved in discovering and replacing vulnerable hardware. Some of the hardware attacks that are in the public domain include:

  1. Breaking AirTags Security with Raspberry Pi Zero
  2. Breaking AES implementation with just two faults
  3. Hardware Attack on M1 Processors
  4. Row-Hammer and Cache-based attacks to break the implementation of several post-Quantum cryptographic algorithms.

The accessibility of open-source tools like ChipWhisperer and Flipper-Zero has lowered the barrier to entry for mounting hardware-based attacks, particularly as many lower-cost microcontrollers powering end devices remain vulnerable. In response, chipset manufacturers increasingly prioritise built-in protections against hardware attacks to fortify device security at a foundational level, bolstering the security posture for running secure software.

Join us at DSCI FINSEC Conclave 2024 to learn more about hardware-specific attacks and novel protections such as physically unclonable functions, Differential Power Analysis and Fault injection countermeasures, memory safety, etc., bolstering the device security at the hardware level.

Registrations Closed

In-person event at The Westin, Powai Lake, Mumbai
CLOSED
Spot Registration
8999
(incl. of taxes)
  • Get access to • All Workshops - Day 1 & 2
    • All Stage Access - Day 1 & 2
    • Networking Dinner
  •  
CLOSED
Regular Pass
8999
(incl. of taxes)
  • Get access to • All Workshops - Day 1 & 2
    • All Stage Access - Day 1 & 2
    • Networking Dinner
  •  
SOLD OUT
CLOSED
Group Registration
starting from
6299 8999
(incl. of taxes)
  • 30% discount on registration of 3+ delegates
  • 40% discount on registration of 8+ delegates
  • Get access to • All Workshops - Day 1 & 2
    • All Stage Access - Day 1 & 2
    • Networking Dinner
SOLD OUT
CLOSED
SHEroes Pass
6299 8999
(incl. of taxes)
  • 30% discount Valid for women delegates only
  • Get access to • All Workshops - Day 1 & 2
    • All Stage Access - Day 1 & 2
    • Networking Dinner
SOLD OUT
Membership Pass
4499 8999
(incl. of taxes)
  • Get access to • All Workshops - Day 1 & 2
    • All Stage Access - Day 1 & 2
    • Networking Dinner