Espressif ESP32: Breaking HW AES with Electromagnetic …
In our previous blog post, we’ve shown how we extracted the secret key from the ESP32’s hardware AES accelerator using a Power Analysis …
Read moreIn our previous blog post, we’ve shown how we extracted the secret key from the ESP32’s hardware AES accelerator using a Power Analysis …
Read moreSide Channel Analysis (SCA) attacks are commonly used for extracting the secret key of cryptographic engines found in modern devices. They exploit …
Read moreWe often analyze the security of devices that implement a Trusted Execution Environment (TEE) and the information described in this post is a result …
Read moreIn this post we finally dive into our approach for exploiting the vulnerabilities we’ve identified in QSEE, Qualcomm’s Trusted Execution …
Read moreWe’ve identified multiple critical software vulnerabilities in QSEE, Qualcomm’s Trusted Execution Environment (TEE), on Qualcomm IPQ40xx …
Read moreIt’s time to get technical! In our previous blog post we notified you already about the vulnerabilities we identified in Qualcomm’s Secure …
Read more