Public Resources
Secure Boot
| Amlogic S905 SoC: bypassing the (not so) Secure Boot to dump the BootROM | fredericb | 2016 | 
Trusted Execution Environment (TEE)
Fault Injection
| Jailbreaking an Electric Vehicle in 2023 or What It Means to ... | Werling et. al. | 2023 | 
| Drone Security and Fault Injection Attacks | IOActive | 2023 | 
| The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs | Bittner et. al. | 2021 | 
| Enter the EFM32 Gecko | LimitedResults | 2021 | 
| nRF52 Debug Resurrection (APPROTECT Bypass) Part 2 | LimitedResults | 2020 | 
| nRF52 Debug Resurrection (APPROTECT Bypass) Part 1 | LimitedResults | 2020 | 
| Pwn the ESP32 Forever: Flash Encryption and Sec. Boot Keys Extraction | LimitedResults | 2019 | 
| Pwn the ESP32 Secure Boot | LimitedResults | 2019 | 
| Glitchy Descriptor Firmware Grab/a> | scanlime | 2016 | 
| Bypassing Secure Boot using Fault Injecton | Timmers et. al. | 2016 | 
| Controlling PC on ARM Using Fault Injection | Timmers et. al. | 2016 | 
| The Xbox 360 reset glitch hack | GliGli et. al. | 2011 | 
Contact Us
Contact Details
Feel free to contact us, we will be happy to listen and support.
						
						Meeuwenlaan 20, 3055 CL, Rotterdam, The Netherlands
					
					
					
						
						Email: info@raelize.com
					
					
					
						
						VAT: NL861445934B01
					
					
					
						
						KVK: 78549477