Measuring Billions of Traces Per Day using Segmented Memory
Side Channel Analysis (SCA) attacks generally speaking consisting of three phases: acquisition, …
Read moreSide Channel Analysis (SCA) attacks generally speaking consisting of three phases: acquisition, …
Read moreModern System-on-Chips (SoCs) include security critical features which are often configured securely …
Read moreIn our previous blog post, we’ve shown how we extracted the secret key from the ESP32’s …
Read moreSide Channel Analysis (SCA) attacks are commonly used for extracting the secret key of cryptographic …
Read moreWe often analyze the security of devices that implement a Trusted Execution Environment (TEE) and …
Read moreIn this post we finally dive into our approach for exploiting the vulnerabilities we’ve …
Read more