10
submitted 11 months ago* (last edited 11 months ago) by XTL@sopuli.xyz to c/embedded@programming.dev

Hardware and embedded software engineer Kévin Courdesses has replicated research into breaking the flash encryption on selected Espressif ESP32 microcontrollers — including the ESP32-C3 and ESP32-C6 — using side-channel attacks to extract data and even bypass secure boot functionality.

"I recently read the Unlimited Results: Breaking Firmware Encryption of ESP32-V3 (Abdellatif et al, 2023) paper," Courdesses explains. "This paper is about breaking the firmware encryption feature of the ESP32 SoC [System on Chip] using a side-channel attack. This was an interesting read, and soon, I wanted to try to reproduce these results. To understand everything about this attack, I wanted to start from scratch, even if it meant sometimes reinventing the wheel."

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here
this post was submitted on 18 Jan 2024
10 points (100.0% liked)

Embedded

263 readers
1 users here now

We talk and share about anything Embedded, including;

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS