Measuring Billions of Traces Per Day using Segmented Memory
Side Channel Analysis (SCA) attacks generally speaking consisting of three phases: acquisition, pre-processing and analysis. The time it takes to …
Read moreSide Channel Analysis (SCA) attacks generally speaking consisting of three phases: acquisition, pre-processing and analysis. The time it takes to …
Read moreModern System-on-Chips (SoCs) include security critical features which are often configured securely using One-Time Programmable (OTP) bits, often …
Read moreIn our previous blog post, we’ve shown how we extracted the secret key from the ESP32’s hardware AES accelerator using a Power Analysis …
Read moreSide Channel Analysis (SCA) attacks are commonly used for extracting the secret key of cryptographic engines found in modern devices. They exploit …
Read moreWe often analyze the security of devices that implement a Trusted Execution Environment (TEE) and the information described in this post is a result …
Read moreIn this post we finally dive into our approach for exploiting the vulnerabilities we’ve identified in QSEE, Qualcomm’s Trusted Execution …
Read more