tchncs
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
repostbot33@lemmy.worldBanned from communityB to netsec@lemmy.worldEnglish · 2 years ago

Breaking the Flash Encryption Feature of Espressif’s Parts

courk.cc

external-link
message-square
1
link
fedilink
  • cross-posted to:
  • reverseengineering@zerobytes.monster
9
external-link

Breaking the Flash Encryption Feature of Espressif’s Parts

courk.cc

repostbot33@lemmy.worldBanned from communityB to netsec@lemmy.worldEnglish · 2 years ago
message-square
1
link
fedilink
  • cross-posted to:
  • reverseengineering@zerobytes.monster
Breaking the Flash Encryption Feature of Espressif's Parts
courk.cc
external-link
I recently read the Unlimited Results: Breaking Firmware Encryption of ESP32-V3 paper. This paper is about breaking the firmware encryption feature of the ESP32 SoC using a Side-Channel attack. This was an interesting read, and soon, I wanted to try to reproduce these results with the following constraints: To understand everything about this attack, I wanted to start from scratch, even if it meant sometimes reinventing the wheel. I wanted to keep things low-cost. This means no five-figure digital oscilloscope could be used, as it’s sometimes the case for such attacks. A few weeks later, not only have I been able to reproduce the paper’s results regarding the ESP32, but I have also: Mounted a similar attack against the ESP32-C3 and ESP32-C6. Mounted a secure boot bypass attack based on voltage glitches for both the ESP32-C3 and ESP32-C6. The first article will detail the side-channel attacks, starting from the basics. A second one will focus on Secure Boot bypass techniques.
alert-triangle
You must log in or # to comment.
  • Grimy@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 years ago

    Love the cartridge board design he uses. Cool article.

netsec@lemmy.world

netsec@lemmy.world

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !netsec@lemmy.world

Technical news and discussion of information security.

Rules:

  1. Be excellent to each other
  2. Keep it on topic
  3. Absolutely no PII or doxing
  4. No disclosure posts
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1 user / day
  • 1 user / week
  • 1 user / month
  • 29 users / 6 months
  • 20 local subscribers
  • 1.41K subscribers
  • 1.32K Posts
  • 133 Comments
  • Modlog
  • mods:
  • t8r@lemmy.world
  • BE: 0.19.15
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org