Public Resources
Secure Boot
Amlogic S905 SoC: bypassing the (not so) Secure Boot to dump the BootROM | fredericb | 2016 |
Trusted Execution Environment (TEE)
Fault Injection
Jailbreaking an Electric Vehicle in 2023 or What It Means to ... | Werling et. al. | 2023 |
Drone Security and Fault Injection Attacks | IOActive | 2023 |
The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs | Bittner et. al. | 2021 |
Enter the EFM32 Gecko | LimitedResults | 2021 |
nRF52 Debug Resurrection (APPROTECT Bypass) Part 2 | LimitedResults | 2020 |
nRF52 Debug Resurrection (APPROTECT Bypass) Part 1 | LimitedResults | 2020 |
Pwn the ESP32 Forever: Flash Encryption and Sec. Boot Keys Extraction | LimitedResults | 2019 |
Pwn the ESP32 Secure Boot | LimitedResults | 2019 |
Glitchy Descriptor Firmware Grab/a> | scanlime | 2016 |
Bypassing Secure Boot using Fault Injecton | Timmers et. al. | 2016 |
Controlling PC on ARM Using Fault Injection | Timmers et. al. | 2016 |
The Xbox 360 reset glitch hack | GliGli et. al. | 2011 |
Contact Us
Contact Details
Feel free to contact us, we will be happy to listen and support.
Meeuwenlaan 20, 3055 CL, Rotterdam, The Netherlands
Email: info@raelize.com
VAT: NL861445934B01
KVK: 78549477