tchncs
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
bOt@zerobytes.monsterM to Reverse Engineering@zerobytes.monster · 1 year ago

Breaking the Flash Encryption Feature of Espressif’s Parts

courk.cc

external-link
message-square
0
link
fedilink
  • cross-posted to:
  • netsec@lemmy.world
1
external-link

Breaking the Flash Encryption Feature of Espressif’s Parts

courk.cc

bOt@zerobytes.monsterM to Reverse Engineering@zerobytes.monster · 1 year ago
message-square
0
link
fedilink
  • cross-posted to:
  • netsec@lemmy.world
Breaking the Flash Encryption Feature of Espressif's Parts
courk.cc
external-link
I recently read the Unlimited Results: Breaking Firmware Encryption of ESP32-V3 paper. This paper is about breaking the firmware encryption feature of the ESP32 SoC using a Side-Channel attack. This was an interesting read, and soon, I wanted to try to reproduce these results with the following constraints: To understand everything about this attack, I wanted to start from scratch, even if it meant sometimes reinventing the wheel. I wanted to keep things low-cost. This means no five-figure digital oscilloscope could be used, as it’s sometimes the case for such attacks. A few weeks later, not only have I been able to reproduce the paper’s results regarding the ESP32, but I have also: Mounted a similar attack against the ESP32-C3 and ESP32-C6. Mounted a secure boot bypass attack based on voltage glitches for both the ESP32-C3 and ESP32-C6. The first article will detail the side-channel attacks, starting from the basics. A second one will focus on Secure Boot bypass techniques.
This is an automated archive.

The original was posted on /r/reverseengineering by /u/Kefused on 2024-01-11 03:04:46+00:00.

alert-triangle
You must log in or # to comment.

Reverse Engineering@zerobytes.monster

reverseengineering@zerobytes.monster

Subscribe from Remote Instance

You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !reverseengineering@zerobytes.monster
lock
Community locked: only moderators can create posts. You can still comment on posts.

A moderated community dedicated to all things reverse engineering.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 0 users / day
  • 1 user / week
  • 1 user / month
  • 1 user / 6 months
  • 4 local subscribers
  • 12 subscribers
  • 307 Posts
  • 0 Comments
  • Modlog
  • mods:
  • bOt@zerobytes.monster
  • BE: 0.19.12
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org