Espressif ESP32: Using Crowbar Glitches to Bypass Encrypted …
In this blog post, we describe our adventure(s) reproducing our EMFI attack on Espressif’s ESP32 using Crowbar glitches.
Read moreIn this blog post, we describe our adventure(s) reproducing our EMFI attack on Espressif’s ESP32 using Crowbar glitches.
Read moreSide Channel Analysis (SCA) attacks generally speaking consisting of three phases: acquisition, pre-processing and analysis. The time it takes to …
Read moreModern System-on-Chips (SoCs) include security critical features which are often configured securely using One-Time Programmable (OTP) bits, often …
Read moreIn our previous blog post, we’ve shown how we extracted the secret key from the ESP32’s hardware AES accelerator using a Power Analysis …
Read moreSide Channel Analysis (SCA) attacks are commonly used for extracting the secret key of cryptographic engines found in modern devices. They exploit …
Read moreWe often analyze the security of devices that implement a Trusted Execution Environment (TEE) and the information described in this post is a result …
Read more